Check Point IPS is useful for our company's cybersecurity framework since the product acts as a threat prevention system. My company uses the product's prevention mode over its detection mode. There is a different IT security team in my company, which is basically like an information security team, who actually analyze reports on a day-to-day basis while checking for any middleware attacks or DDoS attacks. The tool is very useful, and the IT security team can prevent attacks with the help of Check Point IPS. Check Point IPS can also be used to detect malware. I don't have any idea whether the product has improved the security part. The internal response time to any attacks is something that depends on how critical the situation is in our company. If any attacks are at the beginning stage, then it acts very quickly, and otherwise, it takes time depending on the severity of the incident or task. If there are any urgent requirements, then my company can make a call and reach out to Check Point IPS. In terms of the product's integration capabilities with our company's existing infrastructure, I would say that my company has been using the tool since 2017 and has not faced any challenges. My company needs to upgrade our devices. I definitely recommend that others use the product because it is easy to configure, offers proven IT security services, and is very effective against zero-day attacks or middleware attacks. I rate the solution a ten out of ten.
Security Operations Manager at Network International
Real User
Top 10
2024-04-26T08:10:06Z
Apr 26, 2024
A few integrations with Check Point IPS are a bit complicated, especially the cloud-based ones. The product's integration part is complicated because its users need a lot of support and HA so that it can work in a high-level architecture while also being integrated mainly with cloud platforms and considered a reliable source. If I speak about objects in Check Point IPS, specifically in terms of the screening, sometimes it will go into the deepest screening which one may not be able to see the logs and for that we need to enable search specific logs, and it needs to be validated. For the aforementioned process, it should be simplified, and similar to other products. There should not be areas that are invisible and it should be transparent. I rate the tool an eight out of ten.
The solution exceeded our expectations. The Check Point IPS works with other security solutions, such as Ubiquiti and Bitdefender. Each product has its role in securing our network, devices, and users. We also use Microsoft Active Directory. I rate the tool a ten out of ten. You need to spend time and understand the product's capabilities.
I recommend using the out-of-path installation of this tool. Then, find the desired signature and fine-tune the exception based on your specific environment, including the port involved. Once done, bring the tool line into the traffic. Finally, enable the signatures one by one instead of relying on a single group containing older signatures. The solution has the inherent complexity of managing IT infrastructure and configuring Check Point IPS. The Signature Management requires manual customization to adapt to your network traffic conditions. Building and customizing signatures is a complex and demanding task. Overall, I rate the solution a seven out of ten.
Our company has been expanding the use of Check Point IPS. We currently have twelve nodes, and we are considering expanding them. We continue to have Check Point IPS in our company, and we even changed from physical devices to virtual devices, including MCO solutions. Considering how Check Point has evolved as a company, I would definitely recommend the solution to those planning to use it. Now, we are investigating the competitors of Check Point to have a better position when we negotiate prices. We also work with FortiGate in our company. If you look at FortiGate or Check Point, they are the top-line products in the firewall industry at the moment. Check Point is like a top-level provider of firewall solutions. Overall, I rate the solution a nine out of ten.
I rate Check Point IPS seven out of 10. Check Point is doing some ongoing consolidation. They are trying to unify the look and feel of the on-premise and cloud. That's in the roadmap, so that's why I'm giving it a seven. Once that is unified, maybe I will bump it up to 10. If you are an SMB customer, Check Point has prepackaged suites that are cost-effective and best for the total cost of ownership. If a customer is asking for something specific I will probably recommend Palo Alto. It depends on use case scenarios. This was a perfect fit for my current customer's use case scenarios.
Network Security at a insurance company with 51-200 employees
Real User
2022-08-01T13:25:35Z
Aug 1, 2022
We are replacing the IPS from Check Point with a different solution, which is related to the IPS functionality. The reason for the replacement is because Check Point IPS are at their end of life and are not creating or not using the security policy for the traffic, it mostly acts as an IPS. We are planning on using Trend Micro. It will be better because there will be a dedicated device that is doing only the IPS. The performance will be better and it has a larger number of patterns updated weekly. I have a very long and extensive experience with the Check Point ISP. It is a good solution, but sometimes it's causing issues, but it's a general problem for all the networks and security devices. I rate Check Point IPS a nine out of ten.
Director Of Information Technology at a security firm with 1-10 employees
Real User
2022-07-01T23:23:30Z
Jul 1, 2022
If I could only keep one of my security solutions, it would be Check Point. To me, it provides the most valuable information. I would rate this solution a nine out of ten.
System and Network Administrator at Auriga - The banking e-volution
Real User
2021-05-08T14:17:00Z
May 8, 2021
In summary, this is a well-made product and I don't feel like I would suggest improvements other than having more reports. I recommend its adoption to those who have the availability of a team, internal or external, that has the ability to manage it and the knowledge of the company.
CTO at a computer software company with 11-50 employees
Real User
2021-05-06T20:08:00Z
May 6, 2021
In summary, since we have installed Check Point IPS, we really have not had any major complaints or requests for improvement. It was pretty easy to get up and running and configured to protect our environment.
My advice would be to always have it with the latest database because you want to be protected against the latest attack vectors. It's very important to have it doing automatic updates so that when Check Point reviews an update of an attack that is currently happening, you always get it first before you get the effect. I would rate Check Point IPS a nine out of ten. Not a ten because of the logging issues we've experienced.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T18:41:00Z
Jul 23, 2020
The correct performance sizing is essential for this kind of software - use the tools provided by the vendor, and consult the sales if you are still not sure.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
2020-03-04T08:49:35Z
Mar 4, 2020
My advice for anybody who is researching this type of solution is that they need to choose the product carefully. Most importantly, I would look from a performance perspective. Secondly, I would consider it from a pricing perspective because there are cheaper solutions available like Sophos and Fortinet, and they are good at what they do. If there is no firewall in place at all and this is their first project with protecting the enterprise, then it is reasonable to look at all of the vendors and look at what features are needed. The most important part is what your administrators are used to using because if you need to train them then it's additional costs. The next thing that I would suggest is to make sure that you get a good partner because it is important to have good first-level support. The biggest lesson that I have learned from using Check Point IPS is to be quite careful about which features you enable with it, and which protections to use. You need to balance performance with security, finding exactly the right configuration for your environment and requirements. Overall, I would say that this is a decent product. If the pricing were cheaper then I would say that it was perfect. I would rate this solution an eight out of ten.
We use the on-premises deployment model. We're still in the process of evaluating options. We're doing a POC with Cisco and Darktrace and are moving away from Check Point. I'd rate the solution seven out of ten.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other...
Overall, I rate Check Point IPS a nine out of ten. I recommend it to other users for its integration capabilities and stability.
I'd rate the solution eight out of ten.
Check Point IPS is a preferable solution for its price, stability, and deployment ease compared to more complex solutions.
Check Point IPS is useful for our company's cybersecurity framework since the product acts as a threat prevention system. My company uses the product's prevention mode over its detection mode. There is a different IT security team in my company, which is basically like an information security team, who actually analyze reports on a day-to-day basis while checking for any middleware attacks or DDoS attacks. The tool is very useful, and the IT security team can prevent attacks with the help of Check Point IPS. Check Point IPS can also be used to detect malware. I don't have any idea whether the product has improved the security part. The internal response time to any attacks is something that depends on how critical the situation is in our company. If any attacks are at the beginning stage, then it acts very quickly, and otherwise, it takes time depending on the severity of the incident or task. If there are any urgent requirements, then my company can make a call and reach out to Check Point IPS. In terms of the product's integration capabilities with our company's existing infrastructure, I would say that my company has been using the tool since 2017 and has not faced any challenges. My company needs to upgrade our devices. I definitely recommend that others use the product because it is easy to configure, offers proven IT security services, and is very effective against zero-day attacks or middleware attacks. I rate the solution a ten out of ten.
A few integrations with Check Point IPS are a bit complicated, especially the cloud-based ones. The product's integration part is complicated because its users need a lot of support and HA so that it can work in a high-level architecture while also being integrated mainly with cloud platforms and considered a reliable source. If I speak about objects in Check Point IPS, specifically in terms of the screening, sometimes it will go into the deepest screening which one may not be able to see the logs and for that we need to enable search specific logs, and it needs to be validated. For the aforementioned process, it should be simplified, and similar to other products. There should not be areas that are invisible and it should be transparent. I rate the tool an eight out of ten.
The solution exceeded our expectations. The Check Point IPS works with other security solutions, such as Ubiquiti and Bitdefender. Each product has its role in securing our network, devices, and users. We also use Microsoft Active Directory. I rate the tool a ten out of ten. You need to spend time and understand the product's capabilities.
I recommend using the out-of-path installation of this tool. Then, find the desired signature and fine-tune the exception based on your specific environment, including the port involved. Once done, bring the tool line into the traffic. Finally, enable the signatures one by one instead of relying on a single group containing older signatures. The solution has the inherent complexity of managing IT infrastructure and configuring Check Point IPS. The Signature Management requires manual customization to adapt to your network traffic conditions. Building and customizing signatures is a complex and demanding task. Overall, I rate the solution a seven out of ten.
Overall, I rate the solution a nine out of ten.
Our company has been expanding the use of Check Point IPS. We currently have twelve nodes, and we are considering expanding them. We continue to have Check Point IPS in our company, and we even changed from physical devices to virtual devices, including MCO solutions. Considering how Check Point has evolved as a company, I would definitely recommend the solution to those planning to use it. Now, we are investigating the competitors of Check Point to have a better position when we negotiate prices. We also work with FortiGate in our company. If you look at FortiGate or Check Point, they are the top-line products in the firewall industry at the moment. Check Point is like a top-level provider of firewall solutions. Overall, I rate the solution a nine out of ten.
I would rate the product an eight out of ten.
I would give Check Point IPS a seven out of ten. We started using this product a year ago, and it has worked well for us.
We recommend the product. It is highly safe and easy to use.
The security measures are effective and I'd recommend the product to companies seeking great performance.
I rate Check Point IPS seven out of 10. Check Point is doing some ongoing consolidation. They are trying to unify the look and feel of the on-premise and cloud. That's in the roadmap, so that's why I'm giving it a seven. Once that is unified, maybe I will bump it up to 10. If you are an SMB customer, Check Point has prepackaged suites that are cost-effective and best for the total cost of ownership. If a customer is asking for something specific I will probably recommend Palo Alto. It depends on use case scenarios. This was a perfect fit for my current customer's use case scenarios.
This is not a difficult tool to use as long as you understand the basics of networking and security. I rate this solution nine out of 10.
It is a good tool. However, you must have a GWs environment in use to be able to add it.
One piece of advice is to have the latest database. You want to be protected against the latest attacks.
We are replacing the IPS from Check Point with a different solution, which is related to the IPS functionality. The reason for the replacement is because Check Point IPS are at their end of life and are not creating or not using the security policy for the traffic, it mostly acts as an IPS. We are planning on using Trend Micro. It will be better because there will be a dedicated device that is doing only the IPS. The performance will be better and it has a larger number of patterns updated weekly. I have a very long and extensive experience with the Check Point ISP. It is a good solution, but sometimes it's causing issues, but it's a general problem for all the networks and security devices. I rate Check Point IPS a nine out of ten.
If I could only keep one of my security solutions, it would be Check Point. To me, it provides the most valuable information. I would rate this solution a nine out of ten.
I would rate this solution 10 out of 10.
Make sure you have a good vibe from your sales team. They tend to support you in the long run.
I am happy with the solution and have been using it since i started working for the company (10 years now). I dont want to be without it.
So far, I have no regrets about choosing this solution.
The solution is best in class.
In summary, this is a well-made product and I don't feel like I would suggest improvements other than having more reports. I recommend its adoption to those who have the availability of a team, internal or external, that has the ability to manage it and the knowledge of the company.
In summary, since we have installed Check Point IPS, we really have not had any major complaints or requests for improvement. It was pretty easy to get up and running and configured to protect our environment.
For the most part, we don't have any problems with this product. I would rate this solution an eight out of ten.
My advice would be to always have it with the latest database because you want to be protected against the latest attack vectors. It's very important to have it doing automatic updates so that when Check Point reviews an update of an attack that is currently happening, you always get it first before you get the effect. I would rate Check Point IPS a nine out of ten. Not a ten because of the logging issues we've experienced.
The IPS is a very good blade in Check Point NGFW.
The correct performance sizing is essential for this kind of software - use the tools provided by the vendor, and consult the sales if you are still not sure.
My advice for anybody who is researching this type of solution is that they need to choose the product carefully. Most importantly, I would look from a performance perspective. Secondly, I would consider it from a pricing perspective because there are cheaper solutions available like Sophos and Fortinet, and they are good at what they do. If there is no firewall in place at all and this is their first project with protecting the enterprise, then it is reasonable to look at all of the vendors and look at what features are needed. The most important part is what your administrators are used to using because if you need to train them then it's additional costs. The next thing that I would suggest is to make sure that you get a good partner because it is important to have good first-level support. The biggest lesson that I have learned from using Check Point IPS is to be quite careful about which features you enable with it, and which protections to use. You need to balance performance with security, finding exactly the right configuration for your environment and requirements. Overall, I would say that this is a decent product. If the pricing were cheaper then I would say that it was perfect. I would rate this solution an eight out of ten.
We use the on-premises deployment model. We're still in the process of evaluating options. We're doing a POC with Cisco and Darktrace and are moving away from Check Point. I'd rate the solution seven out of ten.