Check Point CloudGuard Network Security and Check Point NGFW compete in the cybersecurity category. CloudGuard has the upper hand in cloud environments, whereas NGFW excels in on-premises security.
Features: CloudGuard Network Security supports auto-scaling, diverse cloud platforms, and flexible licensing options like PAYG and BYOL, making it ideal for cloud deployments. It emphasizes advanced threat prevention, application control, and centralized management for hybrid environments. Check Point NGFW, valued for its deep packet inspection, offers threat emulation and intrusion prevention, making it suitable for on-premises setups. It handles complex security policies efficiently and features a wide array of security blades.
Room for Improvement: CloudGuard could improve with better technical support and documentation, as well as enhancements to VM management and Microsoft CASB compatibility. For NGFW, user interface improvements and better integration capabilities are suggested, along with simplified deployment and increased scalability options.
Ease of Deployment and Customer Service: CloudGuard is praised for its flexibility across hybrid and public cloud settings but may encounter setup challenges. NGFW benefits from Check Point's strong partnerships in on-premises deployments, with centralized management adding value. Despite mixed reviews on customer service, both products remain supported by Check Point's dedicated team.
Pricing and ROI: CloudGuard offers flexible pricing models like PAYG and BYOL, favoring cloud-specific financial benefits and ROI through reduced operational costs. While NGFW is perceived as pricier due to its extensive security features, it offers long-term security resilience and comprehensive threat management, which can offset costs. Both solutions are considered valuable investments.
Clients are now comfortable and not wasting productive hours on IT support.
We have experienced a positive return on investment by utilizing Fortinet's products.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
Implementing CloudGuard has resulted in an excellent return on investment over one hundred percent ROI.
He explained that it required a command line configuration, as it couldn't be done through the graphical user interface.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
Available twenty-four by seven.
The support team is responsive and cooperative.
The support team we engaged was knowledgeable and well-versed with the application.
I rate technical support from Check Point at ten out of ten.
When I can't resolve an issue technically, I consult with a senior engineer.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The processor, the microprocessor and the security processors are very intelligent so they can scale significantly and manage that well.
There are many options available, and we can choose the size of the box based on our requirements.
The solution is scalable to support our growth for at least two to three more years.
Scalability must be carefully planned for, considering future growth and user base increases.
It enhances performance with high availability, shifting to a secondary firewall if one fails.
There are no bugs or glitches, and it doesn't crash or freeze.
Improper handling of these can lead to a memory surge, a well-known bug that can cause the entire system to freeze.
It is less stable than Palo Alto Networks and Check Point firewalls because there are lots of bugs in the latest firmware.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The user interface could be more intuitive, and the initial setup and configuration can be complex, requiring a technical team.
Check Point does not initially support serverless architecture, requiring additional efforts from our team to manage it.
Check Point would benefit from having a single console for both basic and policy configurations.
The graphical user interface (GUI) could benefit from some updates.
In the rule creation process, we need to decide on the source address, destination address, and services.
Secure SD-WAN is free of charge.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
The pricing and licensing are expensive, costing between seven thousand to eight thousand dollars.
Pricing is high, over $25,000 USD annually.
In comparison to Fortinet and other products, the pricing may be considered high.
We found the pricing reasonable, ensuring the product was not overpriced.
Fortigate blocks unusual traffic and therefore secures our network.
It's easy to monitor the end-to-end network through the firewall.
The firewall, IPS, and VPN functions are the most valuable features.
One of the most valuable features is the automated threat prevention, which helps us detect and block potential cyberattacks in real-time, minimizing data breaches.
Check Point CloudGuard provides comprehensive security coverage.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
In the normal GA login, I can create interfaces and configure interface IPs, while in the SmartConsole, I manage the NAT quality and firewall access.
One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point CloudGuard Network Security is designed to secure cloud assets, offering robust firewall capabilities and protection for both internal and external traffic across AWS, Azure, and on-premises environments.
Enterprises rely on Check Point CloudGuard Network Security for comprehensive network protection, threat prevention, and compliance enforcement. Supporting virtual machines and hybrid environments, it delivers advanced security measures including intrusion prevention and application control. Key functions include firewall security, network segmentation, and cloud environment protection, ensuring businesses maintain a secure and compliant IT infrastructure.
What are the most valuable features of Check Point CloudGuard Network Security?In industries such as financial services, healthcare, retail, and education, Check Point CloudGuard Network Security is implemented to safeguard sensitive data, ensure compliance, and protect critical infrastructure. Companies in these sectors benefit from its advanced threat prevention and flexible deployment options, meeting their stringent security requirements while enabling secure digital transformation.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.