Try our new research platform with insights from 80,000+ expert users
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Improves efficiency and lowers bandwidth costs but needs more scalability
Pros and Cons
  • "One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network."
  • "The solution should improve integration."

What is our primary use case?

Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes. 

Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.

How has it helped my organization?

It has given us the ability to optimize advanced caching and comprehension techniques to improve web performance and reduce the bandwidth used by online applications. This allows our company to improve the efficiency of its network infrastructure and reduces bandwidth costs, thus achieving outstanding performance in the generation of reports and analysis. Now, we can better understand the use of the web and the threats we face every day. The solution allows for general organization reports, offering us data and information in a personalized way. 

What is most valuable?

One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network. This allows us to filter and analyze all network traffic, including web traffic, and to effectively detect and block any web or malware threats that may be trying to infiltrate the network. 

In addition to providing us with threat protection, we can also make use of tools to control the bandwidth and limit of users to websites and online applications. This helps us prevent users from accessing malicious websites or any site that is not authorized. 

What needs improvement?

The solution should improve integration. Today, its scalability is one of its few characteristics that must be improved. We may need to consider an alternative solution due to its complexity. We need more elasticity to make it more scalable, dynamic, and efficient. It is important to note that many of its analytics features are among the best, yet it still needs improvements and updates that are faster and more efficient under control directives and policies. We would like an easy deployment and a solution that can scale vertically or horizontally. 

Buyer's Guide
Check Point Web Gateway
November 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Top 5
Good blocking and URL filtering with helpful support
Pros and Cons
  • "Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding."
  • "The learning curve is complex for new users."

What is our primary use case?

Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.

How has it helped my organization?

There have been reduced attacks from cyber criminals since we deployed this product. The security models enhance safe collaboration among teams and embrace teamwork. It has enabled the IT teams to set up a unified control system for tracking website performance. Implementation of set projects and tasks has been efficient with available resources. The deployed security services protect all the organization's employees based on the set company policies. Employees can focus on productive goals without fear of ransomware attacks.

What is most valuable?

URL filtering has shielded employees from engaging with unsafe browsing sites that can spread viruses. It provides red alerts when there is an attempt from an unauthorized user who may be accessing confidential information. 

The product blocks unsafe content from the internet that can affect internal data. 

Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding. 

Data Loss Prevention helps us to categorize and share data that is not harmful or can leak confidential data to the wrong personnel.

What needs improvement?

The set features have been guarding our websites against external attacks effectively. 

The learning curve is complex for new users. That said, with time, everything runs effectively. The cost of deployment and maintenance is high for SMEs. We have achieved most set goals as planned without failure. 

Antivirus features block trojans and harmful content from affecting workflows, and that has saved us a lot of money. 

Updates come late, sometimes exposing the organization to attacks that can affect operations. 

This product has good features that have been of great improvement overall.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

Operations have been running effectively.

What do I think about the scalability of the solution?

The performance has always been stable.

How are customer service and support?

I am pleased with the customer support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with similar tools.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation took place through the vendor.

What was our ROI?

There is increased ROI from stable performance.

What's my experience with pricing, setup cost, and licensing?

The cost and setup depend on the size of the company.

Which other solutions did I evaluate?

This is the best tool that I have come across so far.

What other advice do I have?

For website security, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Web Gateway
November 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Prevents prevent data loss has good content filtering and offers good security
Pros and Cons
  • "It offers good security and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility."
  • "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."

What is our primary use case?

We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access. 

How has it helped my organization?

The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers. The evolution of technological attacks or hacks has become very innovative and sophisticated, which can make any organization vulnerable. However, we have come to feel safe implementing this type of solution as it has given us the protection that each one of us was looking for.

What is most valuable?

The Check Point Security Web Gateway service has the most beneficial features available for anyone. Among many of the things that we can highlight is the content filtering application control. Checking for antiviruses is enabled through the inspection solution. It offers good security, and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility.

What needs improvement?

The solution is quite complete and is very prominent. It is designed to be implemented for web services. We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment. If they could do this and provide the same connectivity, security, and efficiency that it has today for edge equipment, that would be ideal. If we could bring this service to mobile applications and applications directly installed on the device, we could expand and create a neural security network for all the devices we have.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
URL filtering and application control help us to secure against malicious websites and applications
Pros and Cons
  • "Application control allows the administrator to create granular policies based on users to allow, block, or limit access."
  • "Most of the time, we are struggling when it comes to getting support."

What is our primary use case?

We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites.

With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.

How has it helped my organization?

Check Point Web Gateway has improved our inbound and outbound traffic for applications or websites and related queries with features such as URL Filtering. It can control access to websites based on URLs to prevent employees from accessing malicious or inappropriate content and also we enforce bandwidth on streaming services.

These are very good features for us.

We can also now easily identify which users are accessing which URLs, and we can control access based upon them.

Application control allows the administrator to create granular policies based on users to allow, block, or limit access.

What is most valuable?

With Check Point Web Gateway, we have found the following features the most valuable:

  1. URL Filtering
  2. Application Control
  3. Antivirus

URL filtering allows us to control websites based on URL contents and whether any inappropriate content or any malicious content is there.

It allows us to enforce bandwidth restrictions on a specific destination or URL, where some streaming service content is available.

URL filtering management is based on the URL, users, and groups, where access can be either granted or denied.

What needs improvement?

Most of the time, we are struggling when it comes to getting support. Due to this, we have now have taken TAM support and have also taken third-party support for this product. Generally, the support experience is not what we expect from Check Point.  

For how long have I used the solution?

We have been using this solution for more than one year.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point is a very good solution, although the price and other licensing costs are something that you have to check.

What other advice do I have?

In summary, Check Point Web Security is a very good solution for us. We have been using it for a long time and we use all of the aspects. For security concerns, Check Point Web Security is the best solution with features such as URL filtering, application control, and antivirus.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Flexible with good web filtering and overall robust security
Pros and Cons
  • "The stability of the tool is very good."
  • "Perhaps the latency in the administrative part of the portal would be a point of improvement."

What is our primary use case?

Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure. 

Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network. 

Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.

How has it helped my organization?

When this tool was implemented, it gave us a lot of flexibility and confidence in the organization. The characteristics, such as web filtering and security in URL applications are great. With them, we have great visibility of vulnerabilities that surround us. With analysis, it was possible to attack all the points where the company had security weaknesses and strengthen those points. It also presents a large part of very granular reports or statistics.

What is most valuable?

The Check Point Web Gateway tool presents several valuable features such as URL filtering, application, and antivirus control. These characteristics are very valuable since they are customer-oriented. 

It provides very efficient security and can also be implemented in the cloud, which is very good. In recent years the cloud has gained a lot of strength and is very valuable in terms of IPS capacity.

What needs improvement?

At the moment, we have not found any point of improvement in the last three years. The tool has behaved very well both in scalability and stability. 

Perhaps the latency in the administrative part of the portal would be a point of improvement. 

The technical support of Check Point, in general, has had problems in providing effective, reliable, and timely support. On many occasions, we have had problems and it did not help us in a reasonable amount of time.

That said, in general, the tool provides the respective functionality for which it was created and protects the organization very well.

For how long have I used the solution?

We implemented the solution 4 years ago. 

What do I think about the stability of the solution?

The stability of the tool is very good. They always stay on top of everything. There have been very few times we have seen problems.

What do I think about the scalability of the solution?

It has very good scalability and is very fast.

How are customer service and support?

The experience with technical support has not been very good. We always have problems with a quick response.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously no tool had been implemented.

How was the initial setup?

The configuration was very simple the tool is easy to install.

What about the implementation team?

The tool was implemented with the IT department and an engineer provided by the vendor with a lot of experience.

What was our ROI?

We've seen an ROI in terms of the security implementation. The price is also important. You have to look for a good tool that 100% meets what you are looking for.

What's my experience with pricing, setup cost, and licensing?

The installation is very easy and user-friendly, and fast. The cost is competitive in the market.

Which other solutions did I evaluate?

Other options were not evaluated since we have handled some Check Point tools previously, and we liked the characteristics of this one.

What other advice do I have?

It is a reliable and safe tool.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Good URL filtering, good blocking, and helps with compliance
Pros and Cons
  • "The most valuable feature that I see in the application is the filtering of the URLs."
  • "I would like to be able to see an integration with centralized management services."

What is our primary use case?

We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.

How has it helped my organization?

This solution gives us protection mainly for users and applications. It allows us to apply compliance policies and regulations based on the role of the corporation's business. We can protect ourselves from high-risk malicious applications on websites. We can block these sites by preventing malware infection. The detection of infected devices with a layered architecture where several layers provide our remote workers with a security policy. Everything is being analyzed and safeguarded and made available to users no matter where they are. We get security and can filter the content, which is something that is needed in order to be well protected.

What is most valuable?

The most valuable feature that I see in the application is the filtering of the URLs. We can see the width of the transmission content and access the data. The filtering with a control solution allows us to manage each one of the layers of the policies and generate a granularity-based assessment of users. We can block or eliminate the use of the application or its characteristics. This allows us to share between private and secure applications within our organization and cover each of the user identities.

What needs improvement?

I would like to be able to see an integration with centralized management services. When I say centralized, I mean maybe even R80 management. I'd like one appliance for centralized management that could handle other features. I don't know if doing this is part of the business strategy of Check Point, however, maybe we could see it in the future.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Antonio Palhinhas - PeerSpot reviewer
Deputy Director of Information and CommuniDeputy Director of Information and Communication Systems at TVI
Real User
Useful content filtering, reliable, and web options
Pros and Cons
  • "The most valuable features of Check Point Web Gateway are all the IPS. However, what matters for users is content and web filtering."
  • "Check Point Web Gateway could improve the user interface. It could be made more modern."

What is our primary use case?

Our primary use for Check Point Web Gateway is network security.

How has it helped my organization?

Being a media company the use of Internet is part of company's business, therefore it is very important to be able to protect both company assets and users. Check Point gateways provided an important role on that security measures.

What is most valuable?

One of the most valuable features of Check Point Web Gateway is the IPS capability. However, what matters most for users security is content and web filtering.

What needs improvement?

Check Point Web Gateway could improve the graphical user interface to make it more appealing. However it works.

For how long have I used the solution?

We have been using Check Point Web Gateway for approximately 10 years.

What do I think about the stability of the solution?

Check Point Web Gateway is a reliable and stable solution.

How are customer service and support?

Personally I do not have experience with the support of Check Point Web Gateway, but the team is happy with it. If there is no solution on their website the phone support usually works fine.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of Check Point Web Gateway was straightforward.

What about the implementation team?

We used the support for the deployment of Check Point Web Gateway.

We have a team of two people for the maintenance of the solution.

What other advice do I have?

My advice to others is for them to make sure they have the right model of Check Point Web Gateway they need for their business. The most inexpensive version might not have have the performance needed.

I rate the price of Check Point Web Gateway an eight out of ten.

There are some other solutions in the market with a bit better performance.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Security Analyst at Banco de Fomento Angola
Real User
Top 5
A scalable and intuitive solution that is easy to deploy and maintain
Pros and Cons
  • "SmartConsole is intuitive."
  • "The support must be faster."

What is most valuable?

The product is good in general. SmartConsole is intuitive.

What needs improvement?

We have problems configuring Check Point Remote Access VPN. The clients are connected to Remote Access VPN by IP assignment. The issue is very hard to resolve because we authenticate in Check Point.

For how long have I used the solution?

I have been using the solution for six months.

What do I think about the stability of the solution?

The tool is stable. I rate the stability a seven or an eight out of ten.

What do I think about the scalability of the solution?

The tool is scalable. Three people in my organization are using the product.

How are customer service and support?

The technical support is moderately good. The support must be faster. The responses are not very quick.

How would you rate customer service and support?

Neutral

How was the initial setup?

The installation is easy. It took us one day to deploy the product because it was necessary to know the configurations. It is easy to maintain and upgrade the solution. The updates can be done in five hours.

What about the implementation team?

I installed the tool with the help of a specialist.

What's my experience with pricing, setup cost, and licensing?

We pay a yearly licensing fee for the solution.

What other advice do I have?

I recommend the product to others because it is one of the best solutions. Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user