The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network.
Among its great features is the ability to detect outgoing malware or extraction of compromised data and stop it, thus safeguarding us by isolating the network, the equipment, or the identity of the affected users.
There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network.
It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security.
Cloud Support at a tech company with 51-200 employees
User
2022-05-04T03:03:00Z
May 4, 2022
The reports that are generated are quite important for our objectives, giving visibility to security flaws and making decisions, an excellent complement for our purpose.
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
2021-09-30T07:31:00Z
Sep 30, 2021
IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier.
CTO at a computer software company with 11-50 employees
Real User
2021-05-06T20:08:00Z
May 6, 2021
I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-30T14:29:00Z
Mar 30, 2021
It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level.
The most valuable feature is that it protects us against hundreds of different attack vectors, like ransomware. The protection is always being triggered. People try to access websites that are categorized as malware, so when the users do a DNS request for the IP of those malware websites, the IPS Blade replaces the real IP of the website that is malware with a bogus IP. The user gets an IP that doesn't exist and when he tries to access, it won't work.
IPS can protect our organization with any old vulnerabilities or if any vulnerability detected minutes ago IPS can protect us as per our configured policy.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other...
The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through.
The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network.
It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention.
The possibility of customizing the rules is great.
The integration is a valuable feature.
The most valuable features of the solution are that the product's stability has been very good. The
The product's initial setup is easy.
It is easy to configure.
Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.
Its event analysis and centralization features are very important for any organization.
Check Point offers DDoS and endpoint protection called EDR or XDR, so it provides a holistic security architecture for any organization.
User-friendly and easy to implement.
Some of the features for views and visualization are already predefined as default files.
Among its great features is the ability to detect outgoing malware or extraction of compromised data and stop it, thus safeguarding us by isolating the network, the equipment, or the identity of the affected users.
The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action.
There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network.
Check Point is one of the best security brands worldwide.
IPS logs enable complete visibility and reporting through the smart console.
It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security.
The reports that are generated are quite important for our objectives, giving visibility to security flaws and making decisions, an excellent complement for our purpose.
We are able to define our own rules for detection.
I can generate reports for management automatically based on the threats of the last day/week/whatever is needed.
IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier.
There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection.
The Check Point IPS module allows me granularity in creating rules.
I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden.
It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level.
This is a very stable product.
The most valuable feature is that it protects us against hundreds of different attack vectors, like ransomware. The protection is always being triggered. People try to access websites that are categorized as malware, so when the users do a DNS request for the IP of those malware websites, the IPS Blade replaces the real IP of the website that is malware with a bogus IP. The user gets an IP that doesn't exist and when he tries to access, it won't work.
IPS can protect our organization with any old vulnerabilities or if any vulnerability detected minutes ago IPS can protect us as per our configured policy.
The number of the IPS protections is amazing - after the latest update I see more than 11000 in the SmartConsole.
The reports are well written so that you can understand what type of attack has occurred, the originating IP address, and other details.
The solution's IPS functionality and firewall functionality are the solution's most valuable features.