Find out what your peers are saying about Microsoft, SentinelOne, VirusTotal and others in Anti-Malware Tools.
Even challenging issues like those with VPNs have been resolved efficiently with their help.
We have escalated issues to Check Point technical support multiple times and have received timely and very good responses.
The support team we engaged was knowledgeable and well-versed with the application.
Proactive features help guard against data breaches and vulnerabilities.
If specified correctly, even the smaller boxes offer high session and bandwidth rates, making the solution highly scalable, even up to telco-level requirements.
They offer multiple solutions from SMBs to enterprise data centers, making it an easily scalable solution with no issues in scalability.
Scalability must be carefully planned for, considering future growth and user base increases.
I have worked with Check Point products for 15 years and haven't found any stability or performance issues.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
I have encountered stability issues primarily with VPN, which required a code upgrade.
Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities.
Other products, like FortiGate, are perceived as more intuitive because they are easier to configure from the start.
The graphical user interface (GUI) could benefit from some updates.
Check Point NGFW should concentrate more on the SMB market, as solutions in this space are not as strong in security.
In comparison to Fortinet and other products, the pricing may be considered high.
In the medium-sized business market, it can be seen as expensive, leading to switches to alternatives like Fortinet.
Compared to other solutions, the pricing of Check Point NGFW is high.
Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale.
The most valuable features in my experience include perimeter firewalling, cloud and mobile security, application control, URL filtering, DLP, threat prevention, intrusion protection, and safeguarding against malware, botnets, and zero-day attacks.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access.
Check Point Antivirus is a robust software solution providing a dynamic next-generation group of applications that protect computers and devices by removing malicious software or code specifically created to corrupt computers or data.
In today’s busy marketplace, malware is advancing so expeditiously that it is estimated a new malware instance is generated almost every second. It is widely understood that traditional antivirus solutions on their own are no longer sufficient as they once were to defend today’s organizations against risk and malicious threats. Therefore, to be competitive and value-added, most of today’s antivirus solution providers are developing new methodologies that integrate processes such as global scanning, alerting services, leading industry collaborations, human expert threat analysis, and secure cloud integrations.
Check Point Antivirus Benefits
Check Point Antivirus has many valuable benefits. Some of its most useful benefits include:
Reviews from Real Users
“Check Point Antivirus is the best antivirus tool in the market currently. The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.” - Shyam N., Senior Consultant at EY India
“Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).” - Hazel R., Administrative Assistant at Tecapro
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.