What is our primary use case?
We needed to control sites since some consumptions do not represent and should not be allowed within the network by the company. Creating policies to be able to segment, allow, and block depending on the profiles created has been helpful.
We also needed to validate the access behavior through monitoring to determine what additional rules we could provide to improve security.
How has it helped my organization?
Check Point Web Gateway helped eliminate traffic and access to individual sites and granularly generate restricted access policies to maximize user efficiency without distractions outside of corporate work.
The protection against sites and accesses that have major threats. We are able to protect the equipment, information, and databases that are within the infrastructure, avoiding having any vulnerability accessible.
We like how the integrated product works with our Check Point.
What is most valuable?
It's easy to deploy this tool. This has helped us to be able to implement it correctly. Additionally, this product generates trust with all Check Point technologies.
Its administration dashboards make it easy to use. It's a simple environment but offers great power in order to secure the perimeter.
The registration of logs and monitoring helps us to make accurate decisions to improve perimeter security.
There are also access control rules by categories previously established by the manufacturer. This is a very good feature.
What needs improvement?
An improvement that can be made at the manufacturer level is to be able to modernize the manuals and documentation more. There currently is no documentation for the most modern versions, or it is more difficult to find.
Also, they should improve the costs in order to have greater competition against other solutions. I am not saying that it is an overvalued tool. On the contrary, it is incredibly effective and safe, however, it could have price improvements to increase competition at the cost level compared to other manufacturers.
Buyer's Guide
Check Point Web Gateway
February 2025
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
For how long have I used the solution?
This is a great integrated solution in our Check Point Gateway environment. We have been using them for a long time, approximately three years.
Which solution did I use previously and why did I switch?
Previously we had used open-source tools for these purposes. However, they did not have the power of Check Point.
What's my experience with pricing, setup cost, and licensing?
The only way to access the cost information of Check Point tools is through a partner. My recommendation is to look for a fairly specialized one so that they can provide all the help with implementation and cost estimates.
Which other solutions did I evaluate?
It is always important to evaluate the tools, both in documentation and function, and if it is possible to generate proof of concept. In our case, Check Point is successfully coupled to our environments, that's why it was used.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.