What is our primary use case?
Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure.
Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network.
Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.
How has it helped my organization?
When this tool was implemented, it gave us a lot of flexibility and confidence in the organization. The characteristics, such as web filtering and security in URL applications are great. With them, we have great visibility of vulnerabilities that surround us. With analysis, it was possible to attack all the points where the company had security weaknesses and strengthen those points. It also presents a large part of very granular reports or statistics.
What is most valuable?
The Check Point Web Gateway tool presents several valuable features such as URL filtering, application, and antivirus control. These characteristics are very valuable since they are customer-oriented.
It provides very efficient security and can also be implemented in the cloud, which is very good. In recent years the cloud has gained a lot of strength and is very valuable in terms of IPS capacity.
What needs improvement?
At the moment, we have not found any point of improvement in the last three years. The tool has behaved very well both in scalability and stability.
Perhaps the latency in the administrative part of the portal would be a point of improvement.
The technical support of Check Point, in general, has had problems in providing effective, reliable, and timely support. On many occasions, we have had problems and it did not help us in a reasonable amount of time.
That said, in general, the tool provides the respective functionality for which it was created and protects the organization very well.
For how long have I used the solution?
We implemented the solution 4 years ago.
What do I think about the stability of the solution?
The stability of the tool is very good. They always stay on top of everything. There have been very few times we have seen problems.
What do I think about the scalability of the solution?
It has very good scalability and is very fast.
How are customer service and support?
The experience with technical support has not been very good. We always have problems with a quick response.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously no tool had been implemented.
How was the initial setup?
The configuration was very simple the tool is easy to install.
What about the implementation team?
The tool was implemented with the IT department and an engineer provided by the vendor with a lot of experience.
What was our ROI?
We've seen an ROI in terms of the security implementation. The price is also important. You have to look for a good tool that 100% meets what you are looking for.
What's my experience with pricing, setup cost, and licensing?
The installation is very easy and user-friendly, and fast. The cost is competitive in the market.
Which other solutions did I evaluate?
Other options were not evaluated since we have handled some Check Point tools previously, and we liked the characteristics of this one.
What other advice do I have?
It is a reliable and safe tool.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.