What is our primary use case?
Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need.
Then we were allowed to try this type of tool and see the results.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.
How has it helped my organization?
The Check Point Web Gateway tool has helped us improve the security of the equipment and access that we previously had. Generally, a lot of malware was installed on the equipment, which without the user realizing it affected both the performance and the exposure of the information that they had access. After the implementation of Check Point, these threats disappeared little by little, improving through granular policies in which through user profiles we were attacking to solve them. It's been an excellent tool for us.
What is most valuable?
The features of Check Point Web Gateway that we liked the most are the following:
1- Monitoring. The monitoring provided by Check Point security technologies is very good, easy to understand, and helps in an excellent way to verify the behavior of the tool.
2- Granular Policies. Through granular policies, we were able to create different profiles that depended on the type of user. In some cases, it is more restrictive for normal users than for managerial users, that is, always mainly providing security. However, different restrictions helped us a lot. We could establish them without generating annoyance for the client depending on their role in the company.
3- Easy implementation.
What needs improvement?
The aspects that we have evaluated over time to give an opinion on an improvement that the Check Point security manufacturer can generate are the following:
1- Improvement of technical support. It is important that Check Point can generate greater growth at the support level. Errors are not always easily solved.
2- Updated Documentation. Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support.
3- The costs. Some Check Point features are somewhat expensive.
Buyer's Guide
Check Point Web Gateway
December 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
A very good idea to use a web gateway since it generates greater security in the access of our collaborators to the use of the internet and applications,
The use has been successful for at least two years. Initially, the implementation was carried out partially to see the adaptation of the service, which was widely adopted by users understanding the threats that currently exist.
Which solution did I use previously and why did I switch?
Previously, we had validated options and used open-source tools. However, they were most difficult to manage and use.
What's my experience with pricing, setup cost, and licensing?
I always recommend that, before implementing, a customer discusses the business needs with the vendor in order to choose the ideal product.
Also, implement small tests to test the operation before going to production.
Which other solutions did I evaluate?
We needed to be able to quickly implement a tool that would meet the security needs. We already used Check Point products. It has gone very well for us, which is why we opted for the use of this application without hesitation.
What other advice do I have?
I recommend the use of this tool. However, take your time and validate if it suits your needs completely.
Disclosure: I am a real user, and this review is based on my own experience and opinions.