Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.
Software Engineer at Doddle
Good blocking and URL filtering with helpful support
Pros and Cons
- "Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding."
- "The learning curve is complex for new users."
What is our primary use case?
How has it helped my organization?
There have been reduced attacks from cyber criminals since we deployed this product. The security models enhance safe collaboration among teams and embrace teamwork. It has enabled the IT teams to set up a unified control system for tracking website performance. Implementation of set projects and tasks has been efficient with available resources. The deployed security services protect all the organization's employees based on the set company policies. Employees can focus on productive goals without fear of ransomware attacks.
What is most valuable?
URL filtering has shielded employees from engaging with unsafe browsing sites that can spread viruses. It provides red alerts when there is an attempt from an unauthorized user who may be accessing confidential information.
The product blocks unsafe content from the internet that can affect internal data.
Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding.
Data Loss Prevention helps us to categorize and share data that is not harmful or can leak confidential data to the wrong personnel.
What needs improvement?
The set features have been guarding our websites against external attacks effectively.
The learning curve is complex for new users. That said, with time, everything runs effectively. The cost of deployment and maintenance is high for SMEs. We have achieved most set goals as planned without failure.
Antivirus features block trojans and harmful content from affecting workflows, and that has saved us a lot of money.
Updates come late, sometimes exposing the organization to attacks that can affect operations.
This product has good features that have been of great improvement overall.
Buyer's Guide
Check Point Web Gateway
January 2025
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for 11 months.
What do I think about the stability of the solution?
Operations have been running effectively.
What do I think about the scalability of the solution?
The performance has always been stable.
How are customer service and support?
I am pleased with the customer support services.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have no experience with similar tools.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation took place through the vendor.
What was our ROI?
There is increased ROI from stable performance.
What's my experience with pricing, setup cost, and licensing?
The cost and setup depend on the size of the company.
Which other solutions did I evaluate?
This is the best tool that I have come across so far.
What other advice do I have?
For website security, this is the best solution.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cloud computing at Tech Data Limited
Great for limiting, blocking, or allowing access to sites
Pros and Cons
- "It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it."
- "We would really benefit from some more visual features that can help view the impact of the security gateway in the organization."
What is our primary use case?
The Check Point Web Gateway is a great security asset, providing the website and application control our organization needs. You can set customized access policies to filter network traffic, restricting or even blocking access to both websites and applications when necessary.
It operates as a firewall and protects our cloud environment as an additional layer to the infrastructure. It is cloud-based, which makes its deployment very simple and easy to manage and maintain. The solution is efficient overall.
How has it helped my organization?
The solution helps us with some of the most important and basic preventive actions we can take, like blocking malicious websites and applications from being accessed by our company's users and also protecting our applications from being targeted.
It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it.
When it comes to streaming, it will regulate the bandwidth it consumes and will alert when its consumption goes over the established limit.
What is most valuable?
We grant different levels of accessibility to users based on their role within the company, so we may limit, block, or allow their access to sites and download data or applications depending on what's been established by the organization. Its intuitive algorithm will pick up certain users' uncommon behavior and notify our IT administrators of irregular activity that could go against the company's best interest in terms of both security and productivity, giving ground to customize our security ruleset when needed.
What needs improvement?
We would really benefit from some more visual features that can help view the impact of the security gateway in the organization.
It'd be useful if we could use charts and graphics directly pulled from the console to emphasize our point or the need for policy adjustments or the elimination of redundant rulesets.
I'm sure even from an operational standpoint, we could use it to track better how our day-to-day actions directly affect the company security reinforcement, where we're lacking, and what needs to continue to be done.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Web Gateway
January 2025
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Consultant at ITQS
Flexible with good web filtering and overall robust security
Pros and Cons
- "The stability of the tool is very good."
- "Perhaps the latency in the administrative part of the portal would be a point of improvement."
What is our primary use case?
Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure.
Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network.
Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.
How has it helped my organization?
When this tool was implemented, it gave us a lot of flexibility and confidence in the organization. The characteristics, such as web filtering and security in URL applications are great. With them, we have great visibility of vulnerabilities that surround us. With analysis, it was possible to attack all the points where the company had security weaknesses and strengthen those points. It also presents a large part of very granular reports or statistics.
What is most valuable?
The Check Point Web Gateway tool presents several valuable features such as URL filtering, application, and antivirus control. These characteristics are very valuable since they are customer-oriented.
It provides very efficient security and can also be implemented in the cloud, which is very good. In recent years the cloud has gained a lot of strength and is very valuable in terms of IPS capacity.
What needs improvement?
At the moment, we have not found any point of improvement in the last three years. The tool has behaved very well both in scalability and stability.
Perhaps the latency in the administrative part of the portal would be a point of improvement.
The technical support of Check Point, in general, has had problems in providing effective, reliable, and timely support. On many occasions, we have had problems and it did not help us in a reasonable amount of time.
That said, in general, the tool provides the respective functionality for which it was created and protects the organization very well.
For how long have I used the solution?
We implemented the solution 4 years ago.
What do I think about the stability of the solution?
The stability of the tool is very good. They always stay on top of everything. There have been very few times we have seen problems.
What do I think about the scalability of the solution?
It has very good scalability and is very fast.
How are customer service and support?
The experience with technical support has not been very good. We always have problems with a quick response.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously no tool had been implemented.
How was the initial setup?
The configuration was very simple the tool is easy to install.
What about the implementation team?
The tool was implemented with the IT department and an engineer provided by the vendor with a lot of experience.
What was our ROI?
We've seen an ROI in terms of the security implementation. The price is also important. You have to look for a good tool that 100% meets what you are looking for.
What's my experience with pricing, setup cost, and licensing?
The installation is very easy and user-friendly, and fast. The cost is competitive in the market.
Which other solutions did I evaluate?
Other options were not evaluated since we have handled some Check Point tools previously, and we liked the characteristics of this one.
What other advice do I have?
It is a reliable and safe tool.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at LTTS
URL filtering and application control help us to secure against malicious websites and applications
Pros and Cons
- "Application control allows the administrator to create granular policies based on users to allow, block, or limit access."
- "Most of the time, we are struggling when it comes to getting support."
What is our primary use case?
We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites.
With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.
How has it helped my organization?
Check Point Web Gateway has improved our inbound and outbound traffic for applications or websites and related queries with features such as URL Filtering. It can control access to websites based on URLs to prevent employees from accessing malicious or inappropriate content and also we enforce bandwidth on streaming services.
These are very good features for us.
We can also now easily identify which users are accessing which URLs, and we can control access based upon them.
Application control allows the administrator to create granular policies based on users to allow, block, or limit access.
What is most valuable?
With Check Point Web Gateway, we have found the following features the most valuable:
- URL Filtering
- Application Control
- Antivirus
URL filtering allows us to control websites based on URL contents and whether any inappropriate content or any malicious content is there.
It allows us to enforce bandwidth restrictions on a specific destination or URL, where some streaming service content is available.
URL filtering management is based on the URL, users, and groups, where access can be either granted or denied.
What needs improvement?
Most of the time, we are struggling when it comes to getting support. Due to this, we have now have taken TAM support and have also taken third-party support for this product. Generally, the support experience is not what we expect from Check Point.
For how long have I used the solution?
We have been using this solution for more than one year.
What's my experience with pricing, setup cost, and licensing?
Overall, Check Point is a very good solution, although the price and other licensing costs are something that you have to check.
What other advice do I have?
In summary, Check Point Web Security is a very good solution for us. We have been using it for a long time and we use all of the aspects. For security concerns, Check Point Web Security is the best solution with features such as URL filtering, application control, and antivirus.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Used in Cloud, excellent option, modern and safe
Pros and Cons
- "The implementation of this tool was straightforward."
- "Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support."
What is our primary use case?
Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need.
Then we were allowed to try this type of tool and see the results.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.
How has it helped my organization?
The Check Point Web Gateway tool has helped us improve the security of the equipment and access that we previously had. Generally, a lot of malware was installed on the equipment, which without the user realizing it affected both the performance and the exposure of the information that they had access. After the implementation of Check Point, these threats disappeared little by little, improving through granular policies in which through user profiles we were attacking to solve them. It's been an excellent tool for us.
What is most valuable?
The features of Check Point Web Gateway that we liked the most are the following:
1- Monitoring. The monitoring provided by Check Point security technologies is very good, easy to understand, and helps in an excellent way to verify the behavior of the tool.
2- Granular Policies. Through granular policies, we were able to create different profiles that depended on the type of user. In some cases, it is more restrictive for normal users than for managerial users, that is, always mainly providing security. However, different restrictions helped us a lot. We could establish them without generating annoyance for the client depending on their role in the company.
3- Easy implementation.
What needs improvement?
The aspects that we have evaluated over time to give an opinion on an improvement that the Check Point security manufacturer can generate are the following:
1- Improvement of technical support. It is important that Check Point can generate greater growth at the support level. Errors are not always easily solved.
2- Updated Documentation. Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support.
3- The costs. Some Check Point features are somewhat expensive.
For how long have I used the solution?
A very good idea to use a web gateway since it generates greater security in the access of our collaborators to the use of the internet and applications,
The use has been successful for at least two years. Initially, the implementation was carried out partially to see the adaptation of the service, which was widely adopted by users understanding the threats that currently exist.
Which solution did I use previously and why did I switch?
Previously, we had validated options and used open-source tools. However, they were most difficult to manage and use.
What's my experience with pricing, setup cost, and licensing?
I always recommend that, before implementing, a customer discusses the business needs with the vendor in order to choose the ideal product.
Also, implement small tests to test the operation before going to production.
Which other solutions did I evaluate?
We needed to be able to quickly implement a tool that would meet the security needs. We already used Check Point products. It has gone very well for us, which is why we opted for the use of this application without hesitation.
What other advice do I have?
I recommend the use of this tool. However, take your time and validate if it suits your needs completely.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cloud Engineer at ITQS
Good URL filtering, good blocking, and helps with compliance
Pros and Cons
- "The most valuable feature that I see in the application is the filtering of the URLs."
- "I would like to be able to see an integration with centralized management services."
What is our primary use case?
We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.
How has it helped my organization?
This solution gives us protection mainly for users and applications. It allows us to apply compliance policies and regulations based on the role of the corporation's business. We can protect ourselves from high-risk malicious applications on websites. We can block these sites by preventing malware infection. The detection of infected devices with a layered architecture where several layers provide our remote workers with a security policy. Everything is being analyzed and safeguarded and made available to users no matter where they are. We get security and can filter the content, which is something that is needed in order to be well protected.
What is most valuable?
The most valuable feature that I see in the application is the filtering of the URLs. We can see the width of the transmission content and access the data. The filtering with a control solution allows us to manage each one of the layers of the policies and generate a granularity-based assessment of users. We can block or eliminate the use of the application or its characteristics. This allows us to share between private and secure applications within our organization and cover each of the user identities.
What needs improvement?
I would like to be able to see an integration with centralized management services. When I say centralized, I mean maybe even R80 management. I'd like one appliance for centralized management that could handle other features. I don't know if doing this is part of the business strategy of Check Point, however, maybe we could see it in the future.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Perimeter Security Administrator at a security firm with 51-200 employees
Prevents prevent data loss has good content filtering and offers good security
Pros and Cons
- "It offers good security and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility."
- "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."
What is our primary use case?
We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access.
How has it helped my organization?
The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers. The evolution of technological attacks or hacks has become very innovative and sophisticated, which can make any organization vulnerable. However, we have come to feel safe implementing this type of solution as it has given us the protection that each one of us was looking for.
What is most valuable?
The Check Point Security Web Gateway service has the most beneficial features available for anyone. Among many of the things that we can highlight is the content filtering application control. Checking for antiviruses is enabled through the inspection solution. It offers good security, and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility.
What needs improvement?
The solution is quite complete and is very prominent. It is designed to be implemented for web services. We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment. If they could do this and provide the same connectivity, security, and efficiency that it has today for edge equipment, that would be ideal. If we could bring this service to mobile applications and applications directly installed on the device, we could expand and create a neural security network for all the devices we have.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
An easy-to-deploy solution that most users desire because it fulfills their security needs
Pros and Cons
- "The product covers all the security needs of roaming users."
- "The support team’s response is not fast."
What is our primary use case?
Roaming users use the secure web gateway. We also use the tool for application filtering and web filtering.
What is most valuable?
The product covers all the security needs of roaming users.
What needs improvement?
The support team’s response is not fast. The product must improve its scalability and stability.
For how long have I used the solution?
I have been working with the solution for three years.
What do I think about the stability of the solution?
I rate the stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the scalability a nine out of ten. We have more than 50 customers.
How are customer service and support?
Technical support is good. The support team’s response time is moderate.
How was the initial setup?
The solution is cloud-based. It is very easy to deploy the tool in the customer’s environment.
What about the implementation team?
The solution can be deployed within half an hour or one hour. We have an in-house team for deployment.
What's my experience with pricing, setup cost, and licensing?
Our customers pay a licensing fee annually or once in three or five years, per their requirements.
What other advice do I have?
I am using the latest version of the product. We sell the product. It is very easy to provide the price list and the features. I take care of the solution design and solution presentation to the customer. There are multiple OEMs for web gateways in the market. A set of customers use only Check Point. The ROI depends on the customer. Overall, I rate the tool a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Secure Web Gateways (SWG)Popular Comparisons
Cisco Umbrella
Zscaler Internet Access
Cloudflare One
Skyhigh Security
Forcepoint Secure Web Gateway
Symantec Proxy
Cisco Web Security Appliance
Netskope Next Gen Secure Web Gateway
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- When evaluating Web Security Gateways, what aspect do you think is the most important to look for?
- What is the best security web gateway?
- Is Netskope's SWG as good as the Zscaler SWG?
- What secure web gateway do you recommend?
- Why is Secure Web Gateways (SWG) important for companies?