Try our new research platform with insights from 80,000+ expert users

Check Point IPS vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point IPS
Ranking in Intrusion Detection and Prevention Software (IDPS)
3rd
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
51
Ranking in other categories
No ranking in other categories
Palo Alto Networks Advanced...
Ranking in Intrusion Detection and Prevention Software (IDPS)
7th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
26
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Check Point IPS is 6.3%, down from 10.4% compared to the previous year. The mindshare of Palo Alto Networks Advanced Threat Prevention is 7.3%, down from 8.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Greg Tate - PeerSpot reviewer
Great for detection and access with the capabilities of defining specific rules
Support is the biggest area for improvement. Check Point is responsive, however, their support agents seem to be very siloed in their ability and/or product knowledge. It takes time and escalation to get through most tickets as they are passed from one group to another and then back again. We are able to navigate our support issues with the aid of our account team, so I want to underscore that support is indeed responsive. However, the processes support techs have to follow seem to be the root cause of the support response issues.
Carlos Bracamonte - PeerSpot reviewer
Robust, reliable, simple to install and good technical support
We are attempting to improve the use of URL filtering beyond threat protection. I'm not sure what the remaining threat protection features are off the top of my head. But beyond that, we use URL filtering. We have three approved cases for using external dynamic lists that are stored in a bucket repository. Then, for each URL site that needs to be whitelisted, we add it to the external dynamic list in order to gain access to this email. I would like Wildfire to be implemented. We use the equivalent in Cisco is the integration policies. We have the Wildfire but we are not currently implementing it. We don't have the license to use it, but we are not currently implementing it until we present the use cases that the company gives some value to and they approve the use of it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security."
"The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action."
"The most valuable features of the solution are that the product's stability has been very good. The"
"It is easy to configure."
"Among its great features is the ability to detect outgoing malware or extraction of compromised data and stop it, thus safeguarding us by isolating the network, the equipment, or the identity of the affected users."
"The most valuable feature of Check Point IPS is the management of devices and policies."
"It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security."
"Its event analysis and centralization features are very important for any organization."
"The most valuable feature is its use of machine learning to detect potentially unknown threats."
"Everything has been okay with the solution. We are using all of the features."
"I like the solution's interface."
"I find the malware protection very handy."
"The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."
"With the IP address flag, I was able to see that I was being hacked. The moment there was an interaction between somebody on my network and that IP, the solution was able to flag it, and we were able to protect ourselves."
"We are currently using the URL filtering feature, which is the most popular."
"It is a stable product."
 

Cons

"We want the solution to continue to move towards cloud-based and portability focused for telecommuting users."
"When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite."
"The firmware upgrade process is quite cumbersome."
"There are a lot of false positives. I would like to see integration with some kind of network detection and response in order to make some automation on IPS configuration."
"A reduction in price would always be welcome."
"The service that we want to see in the future is a capacity to segment the IPS services by equipment."
"There is an issue with precision."
"It would be good to update the public documentation of Check Point so that we can generate improvements and best practices based on the documentation."
"In Africa, the technical support is probably not as good as in Europe and the USA because it's a specific premium support, partner-enabled premium support and all of that. But it's really good, I don't really have any complaints, it's fairly good. I'll give them 80%."
"I think they can use some improvement on FID."
"Palo Alto Networks Threat Prevention could improve the commercial offing. Other solutions, such as Fortinet provide better commercial features."
"Right now we are focusing on email. If Palo Alto can increase the features related to email filtering and the new malware, it would help us protect our systems."
"Mission learning techniques should continue to expand and detect unknown threats on the fly."
"The solution needs to improve its local technical support services. There is no premium support offered in our market."
"The technology firewall anomaly network could stand improvement."
"The organization mail security solutions could be improved. There is no mail security solution available."
 

Pricing and Cost Advice

"The pricing is quite reasonable."
"I rate the product price an eight on a scale of one to ten, where one means it is very cheap and ten means it is very expensive. The product is expensive."
"The pricing model can be more competitive."
"The pricing for Check Point IPS is competitive and brings good value for the money."
"Pricing for this solution is negotiable and I'm happy with our pricing."
"My company pays for the yearly licensing of Check Point IPS. It is a very expensive tool."
"I give the price of the solution a five out of ten."
"The price of this product should be reduced."
"The price of the solution is higher than others on the market. A price reduction would be beneficial if it does not impact their database quality."
"It's not too expensive."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"The pricing could be lower."
"There is an initial, expensive investment but the return is good."
"It is an expensive solution and I would like to see a drop in price."
"From one to ten, with one being the most expensive, I would rate the pricing of Palo Alto Networks Threat Prevention a one out of ten. It is my understanding that Palo Alto Networks Threat Prevention is the most expensive one."
"If you want to have all of the good features then you have to pay extra for licensing."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
838,640 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Financial Services Firm
10%
Government
9%
Manufacturing Company
8%
Computer Software Company
17%
Financial Services Firm
11%
Manufacturing Company
9%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point IPS?
The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through.
What is your experience regarding pricing and costs for Check Point IPS?
The price could be lower. It's always better for an end user when prices are reduced. The cost makes it difficult to implement in smaller companies.
What needs improvement with Check Point IPS?
Currently, the solution is good for my needs, so I don't have any particular improvements to recommend. However, a reduction in price would always be welcome.
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
 

Also Known As

Check Point Intrusion Prevention System
No data available
 

Overview

 

Sample Customers

Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Check Point IPS vs. Palo Alto Networks Advanced Threat Prevention and other solutions. Updated: January 2025.
838,640 professionals have used our research since 2012.