We have found the central management (Smart Console) to be very helpful in managing all the firewalls and keeping the software/hotfix versions up to date.
It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades.
Telecommunication Team Leader at a financial services firm with 201-500 employees
Real User
Top 5
2023-05-18T08:39:00Z
May 18, 2023
Its usability is the best for me. As compared to Palo Alto, Juniper, or Cisco firewalls, Check Point firewall has the best user interface for management, reading logs, looking for some objects, and looking for policies.
Admins and executives are more at ease with the compliance engine within the software as it measures how many of the security requirements we're compliant with, making their work much more accessible from that standpoint.
E,g, Check Point Harmony which is a new solution, provides central management of cloud infra, FW, and endpoints that will enable customers to easily manage its infra.
Senior Solution Architect at a comms service provider with 51-200 employees
Real User
2022-03-15T00:44:39Z
Mar 15, 2022
The most valuable feature of Check Point NGFW is the unparalleled distribution of the network traffic. The central management station they have allows you to manage everything from one place.
When applying application control, we can ensure user access to the internet in accordance with company policy and easy implementation if some users need exception access.
If there is a critical issue observed, the Check Point support team can create a custom package that we can deploy on the gateway to mitigate critical issues/bug fixes.
Senior Infrastructure Technical Analyst at https://www.linkedin.com/in/robchaykoski/
User
2021-11-22T19:17:00Z
Nov 22, 2021
By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass.
As a system administrator my favourite part of Check Point is the smart view tracker. This alone is a must-have tool for tracking all traffic traversing the Check Point appliance.
Check Point has a centralized console that makes it possible to manage all the deployed equipment. It also has a built-in VPN service that lets users connect through VPN to our organization, which facilitates teleworking while cutting off unauthorized access to the organization's internal network.
IT Security Manager at a retailer with 10,001+ employees
Real User
2021-08-10T09:31:13Z
Aug 10, 2021
Check Point NGFW is easy to use, flexible and provides good performance. The security of the product is excellent, we do not have to do a lot of patching or upgrades because of vulnerabilities.
IT Manager at a comms service provider with 51-200 employees
Real User
2021-06-25T10:44:00Z
Jun 25, 2021
The AntiSpam/Mail blade was also one of the main reasons we went with this product since we hosted our email server locally. This was an extra layer of protection on top of the existing solution.
AVP - IT Security at a tech services company with 51-200 employees
Real User
2021-05-10T14:21:00Z
May 10, 2021
The central management console has helped with segregation, where planned interventions with management consoles do not have any impact on production or critical business traffic.
CTO at a computer software company with 11-50 employees
Real User
2021-05-05T19:37:00Z
May 5, 2021
The way in which a computer is immediately isolated if it starts behaving badly and I get a notification of an infected computer is also extremely nice and a great feature.
The threat emulation blade and user identity awareness feature has helped us a lot in terms of perimeter security and have given us granular visibility of user access.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-03-22T10:00:00Z
Mar 22, 2021
I think that the most valuable feature is the prevention of known and zero-day threats because they are constantly trying to access your company and compromise its data.
The easy and standardized management interface, now with a complete and functional API mechanism, provides the administrator several ways of managing the solution.
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
2021-02-18T22:07:00Z
Feb 18, 2021
It is easy to control from the central management system. For example, if we have 10 firewalls, and we want to push that same configuration among them, we can use this solution's central management system to do that simultaneously. So, there is time saving in that way. The time savings does depend on the situation. For example, if I am running half an hour of work on each firewall, that will take around 300 minutes. However, if I do this work from the central management system, then it will only take 30 minutes to push the same configuration to those same 10 devices.
Network Associate at a wireless company with 1,001-5,000 employees
Real User
2021-02-17T11:56:00Z
Feb 17, 2021
We have between five and ten firewalls on-premises, and if we want to configure or push the same configuration to all of the firewalls, then the centralized management system is very helpful.
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
2020-12-14T06:56:00Z
Dec 14, 2020
There are also additional features, compared to a Layer 4 or Layer 3 firewall, such as AV signatures and devices, which are very helpful for securing the company's network.
Senior Network Engineer at a tech services company with 1,001-5,000 employees
Real User
2020-11-09T08:11:00Z
Nov 9, 2020
The Threat Management feature makes it very easy to detect the vulnerabilities and other factors. We can make new policy according to it. Policy creation is very simple in Check Point. Because the logs are very good in Check Point Firewall, this reduces our work with the reports that we are getting from the Threat Management. It is very convenient for us to use the reports to make new policies for security and other things.
Sr. Network Engineer at a tech services company with 51-200 employees
Real User
2020-10-13T07:21:00Z
Oct 13, 2020
It has various features, like Threat Prevention and Antivirus. It is easier to use and have knowledge of a single device rather than multiple devices/technologies when doing an installation. It is also easy to use because of having Antivirus and Threat Prevention features within the same firewall.
Senior IT Manager at a mining and metals company with 501-1,000 employees
Real User
2020-10-04T06:40:00Z
Oct 4, 2020
The packet inspections have been a strong point. Our identity collectors have also been helpful. In many ways, Check Point has been a step up from our SonicWalls that we had in-house before that. There's a lot of additional flexibility that we didn't have before.
Firewall Administrator at a tech services company with 1,001-5,000 employees
Real User
2020-09-27T04:10:00Z
Sep 27, 2020
The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily.
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.
Sr. Network Engineer at a consultancy with 51-200 employees
Real User
2020-09-22T07:16:00Z
Sep 22, 2020
They have very good support. In critical scenarios, they provide us very quick solutions, are very well-trained, and have a good knowledge about the product. That is what we expect from them.
Principal Network and Security Consultant at Vodafone
Real User
2020-09-14T06:48:00Z
Sep 14, 2020
Check Point definitely has a great architecture, where you can just enable the software blades and deploy a secure service. Overall, it provides ease of deployment and ease of use.
System Architekt at a insurance company with 1,001-5,000 employees
Real User
2020-09-13T07:02:00Z
Sep 13, 2020
The firewall feature and DDoS Protector, when turned on, keep away attacks from the outside. They also prevent users from accessing things on the Internet that they are not supposed to access.
The biggest thing is the central management. It is quite good and allows us to manage the different firewalls from it. We can implement and configure many firewalls and push our policies to them as well.
Junior Network Specialist - Cloud Operations Engineer at a computer software company with 5,001-10,000 employees
Real User
2020-09-09T06:29:00Z
Sep 9, 2020
One of the most valuable features is the data center object integration with Azure. We are using Azure a lot and there is very nice synchronization between the objects in Azure, and it's very easy to implement rules using this feature.
It provides a central station where it is very easy to deploy our firewall policy in one click to many firewalls. This is one of the leading perks. It saves time by having one central station because I can deploy the same kind of policy to many firewalls at once.
The Anti-Spoofing has the ability to monitor the interfaces. Suppose any spoofed IP addresses are coming from an external interface, it won't allow them. It will drop that traffic. You have two options with the Anti-Spoofing: prevent or detect. If any kind of spoof traffic is coming through the external interface, we can prevent that.
The feature I like the most is their central management, the Smart controller which you can use to manage all the firewalls from one location... Being able to access almost everything in one location — manage all your gateways and get all your logs — for me, is the best feature to work with.
Network Security Consultant at a energy/utilities company with 5,001-10,000 employees
Consultant
2020-09-03T07:49:00Z
Sep 3, 2020
It also gives us a single console for everything. Rather than having one device for URL filtering and a different device as a firewall, this gives us everything in one place.
In R80.10 and above, you can view logs in SmartConsole. You don't have to open another smart tracker to view logs. That is the improvement Check Point has done which makes it better because it is much easier to find logs. This saves time, approximately 40 to 50 a day in one shift.
Network & Systems Administrator I at Department of Mental Health
Real User
2020-09-02T06:45:00Z
Sep 2, 2020
The simplicity of the access control is the most valuable feature for us. It gives us the ability to easily identify traffic that is either being allowed or denied to our network.
IT Specialist at a tech services company with 10,001+ employees
Real User
2020-08-30T08:33:00Z
Aug 30, 2020
We like the centralized management for configuring multiple firewalls. It also gives us the Antivirus, threat prevention, and vulnerability tests. These four features protect the environment with security checks. Vulnerability tests allow us to configure changes that can protect the environment.
Check Point has a lot of features. The ones I love are the antivirus, intrusion prevention, and data loss prevention. Apart from that, there is central management through which we can integrate all the firewalls and support them. It makes it easy to manage all the firewalls.
It gives us centralized management for multiple firewalls. For example, if I want to push the same configuration in 10 firewalls, I can push it all at once with the help of the centralized management system.
Security team leader at a aerospace/defense firm with 10,001+ employees
Real User
Top 10
2020-08-19T07:57:00Z
Aug 19, 2020
The management platform and the dashboard, the graphical user interface, is one of the best, if not the best, in the business. It's the most intuitive and it's really user-friendly in day-to-day operations.
AV, IPS, AntiSpam, Sandbox. That's gentlemen set for any basic security, and it was implemented very well. In our reports, the most exciting results belong to AV and IPS. It can be explained by using ThreatCloud - a global knowledge base, which accumulates signatures for all existing and new coming malware, and all the Check Point solutions are always up to date with potential threats.
It secures my organization. With the application blade, I can make security as application based and the custom application is also very useful. With identity awareness blades we get insights on our local users who are accessing/passing through the respective rule as users. We also use the DLP, IPS, and VPN features.
Advanced logging capabilities: Check Point generates extensive logs which may be very useful to figure out the issues. Its logs also contain too much information which can be used to modify the policy as per user need and organizational security environment. The same can be used to figure out probable attack surface or necessary steps for mitigation.
IT Security Manager at a retailer with 10,001+ employees
Real User
2020-07-28T14:42:00Z
Jul 28, 2020
Check Point is able to satisfy almost any security tool for enterprise clients. This allows us to deploy complex changes from a single management interface, get better visibility, and significantly reduce operational complexity.
Apart from it having very good features, I personally like the vulnerability assistance via report management which detects host and network vulnerability.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T10:53:00Z
Jul 23, 2020
The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing this solution we have to rely on the Cisco ACLs and Zone-Based firewall that we had configured on switches and routers, which in fact a simple stateful firewall, and currently not an efficient for protecting from advanced threats.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and...
Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection.
Some of the most valuable features are URL filtering, web filtering, and content filtering.
The product is flexible.
I like the GUI.
The platform helps our organization to save working hours.
I rate the tool's stability a ten out of ten.
The tool has solid firmware with very few vulnerabilities.
We have found the central management (Smart Console) to be very helpful in managing all the firewalls and keeping the software/hotfix versions up to date.
The IPS is frequently updated so the rules are always new and in place.
The product is very user-friendly.
I like the Next-Generation Firewall.
Check Point has an awesome price-to-benefit ratio, netting you an awesome throughput of IDS/IPS capability compared to Palo Alto, Cisco, and so on.
I haven't had any data leaks or vulnerability situations.
Being able to search in clear text is simple for the customer and for troubleshooting an environment.
The central management and logging are frankly one of the top selling points.
I like the dashboard, redundancy, log analysis, threat prevention and ISP, and VPN.
The tool provides great security.
It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades.
We can precisely determine who has access rights and who is granted permission, regardless of their connection point.
Sandboxing is the most valuable feature.
Its usability is the best for me. As compared to Palo Alto, Juniper, or Cisco firewalls, Check Point firewall has the best user interface for management, reading logs, looking for some objects, and looking for policies.
It provides end-to-end resolution.
The solution is easy to administer thanks to its dashboards. The monitoring is really useful.
It's scalable and provides end-to-end resolution.
It offers services like navigation, control, and filtering, which ensure that all users stay connected to business applications.
This has been of great help in securing our organization. Currently, we have seen a great reduction in attacks.
Centralised dashboard for all checkpoints gateway with options of copying policy from 1 gateway to another
Providing control at single point for enabling different module for NGFW e.g. IPS/SSL/Web Filtering
Check Point NGFW has helped the company in the prevention of cyber attacks that could affect operations and slow down production.
It is giving us a greater reach for greater prevention and is proactively protecting our employees.
It is easy to administrate and maintain.
The documentation is simple to understand and is easily available.
We can decipher the activity of each connection and see what is inside it.
Admins and executives are more at ease with the compliance engine within the software as it measures how many of the security requirements we're compliant with, making their work much more accessible from that standpoint.
The fact that these can be separated and made in different layers provides excellent convenience for the administrators who regulate the rules.
Checkpoint FW is the top-of-mind of FW solutions.
E,g, Check Point Harmony which is a new solution, provides central management of cloud infra, FW, and endpoints that will enable customers to easily manage its infra.
It is one of the best tools in firewall solution
@Adriamcam thanks for your answer. What specifically do you like about it?
It is always on the top of the list of best firewall solutions.
The detection rate for any cyberattacks/suspicious activity is very high (more than 90%).
The user interface is very cool and easy to use.
We can build the new firewalls with minimum efforts.
The small business hardware device was powerful and easy to set up.
The most valuable feature of Check Point NGFW is the unparalleled distribution of the network traffic. The central management station they have allows you to manage everything from one place.
Check Point is more expensive but easier to manage, and their presales and after-sale support are way better than Fortinet's.
Only allows authorized connections and prevents vulnerabilities in a network.
When applying application control, we can ensure user access to the internet in accordance with company policy and easy implementation if some users need exception access.
We have all the features we want or need in this appliance. It's been good so far.
While not being cheap, their pricing models are competitive.
A stable solution with multiple interfaces
If there is a critical issue observed, the Check Point support team can create a custom package that we can deploy on the gateway to mitigate critical issues/bug fixes.
We have not had any issues with the firewall.
By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass.
Everything is easily managed through their Smart Console dashboard. It's a very easy-to-understand dashboard that provides a detailed view.
As a system administrator my favourite part of Check Point is the smart view tracker. This alone is a must-have tool for tracking all traffic traversing the Check Point appliance.
We can easily check firewall configurations against any compliance standard.
Management integration is holistic as centralized management has been core to the solution for decades.
The performance has been very good.
The technical services always replied in a very fast and effective way.
All policies can be deployed and managed in a very simple way.
One of the solution's best features include a packet-filtering firewall that examines packets in isolation.
The Identity-Based Inspection Control gives us the ability to leverage the organization’s Microsoft AD, LDAP, RADIUS, and Cisco pxGrid.
Configuration and deploying are easy.
The firewalling feature and the VPN functionality are excellent.
Check Point NGFW generates very helpful reports based on the logs of the activated features.
Policy configuration has been consistent over the years, so there is not much of a learning curve as upgrades are released.
We used Check Point for implementation, and they are top-notch. They know the hardware and software better than anyone.
The failover from one device to the other has been seamless and we find that we do not lose ongoing SIP calls or Teams chats.
It's enabled us to move away from basic LAN to LAN segmentation to a more powerful user separation approach.
Check Point has a centralized console that makes it possible to manage all the deployed equipment. It also has a built-in VPN service that lets users connect through VPN to our organization, which facilitates teleworking while cutting off unauthorized access to the organization's internal network.
The Blades work fine and the performance optimization is great.
The firewall rule writing and object creation are the best and simplest I've seen on a firewall.
The ease of configuring VPNs can be very useful especially for companies with lots of remote locations.
Many problems have been solved with these firewalls and we've largely been very satisfied.
The pricing is okay.
Check Point NGFW is easy to use, flexible and provides good performance. The security of the product is excellent, we do not have to do a lot of patching or upgrades because of vulnerabilities.
The sales, pre-sales, professional services, and tech support are all very nice.
The AntiSpam/Mail blade was also one of the main reasons we went with this product since we hosted our email server locally. This was an extra layer of protection on top of the existing solution.
I love the redesigned interface starting with R80 as well as the ability for multiple engineers to work on the policy simultaneously.
Check Point has a really cool GUI.
On the firewall side, the security efficacy is good.
It is easy to use, and its management is the best. Check Point has a great unified management solution for firewalls and security products.
From the logs, you can trace back to the rule with a click, which makes it easy to investigate cases.
The information stored in the logs is very descriptive and includes a lot of details.
All of the features are very valuable, but the most valuable features are the sandboxing and the advanced IPS/IDS.
The central management console has helped with segregation, where planned interventions with management consoles do not have any impact on production or critical business traffic.
It creates granular security policies based on users or groups to identify, block or limit the usage of web applications.
Remote access with a secure workspace provides a clear separation between the client and corporate network.
One of the most valuable features is performance improvement, wherewith ClusterXL and CoreXL, you can improve performance.
The way in which a computer is immediately isolated if it starts behaving badly and I get a notification of an infected computer is also extremely nice and a great feature.
The uncomplicated configuration ensures that mistakes are avoided and rules are easily audited.
The threat emulation blade and user identity awareness feature has helped us a lot in terms of perimeter security and have given us granular visibility of user access.
It provides access to the Internet for corporate resources in a secure manner.
The most valuable feature is the powerful, deep packet inspection engine.
We are delighted with the powerful management console and diagnostic tools.
I think that the most valuable feature is the prevention of known and zero-day threats because they are constantly trying to access your company and compromise its data.
Within the organization, the inspection of packages has given us great help in detecting traffic that may be a threat to the institution.
The SmartView monitor and SmartReporter help us to monitor and report on traffic.
The easy and standardized management interface, now with a complete and functional API mechanism, provides the administrator several ways of managing the solution.
The software upgrade procedure is very easy; it just needs few clicks & we are done.
There are many useful features including the Office VPN, which provides us with a seamless connection for users who are working remotely.
One of the benefits that we have realized from using this product is that the user interface makes it easier to operate, compared to using the CLI.
The packet inspection capabilities are great.
Check Point provides dedicated blades to monitor network traffic, which helps while troubleshooting network and packet-related issues.
It is easy to control from the central management system. For example, if we have 10 firewalls, and we want to push that same configuration among them, we can use this solution's central management system to do that simultaneously. So, there is time saving in that way. The time savings does depend on the situation. For example, if I am running half an hour of work on each firewall, that will take around 300 minutes. However, if I do this work from the central management system, then it will only take 30 minutes to push the same configuration to those same 10 devices.
We have between five and ten firewalls on-premises, and if we want to configure or push the same configuration to all of the firewalls, then the centralized management system is very helpful.
I think the VSX has been the most valuable feature for us.
There are also additional features, compared to a Layer 4 or Layer 3 firewall, such as AV signatures and devices, which are very helpful for securing the company's network.
The features that are important include: IPS, sandbox, SandBlast, Anti-Bot, and URL filtering.
The Threat Management feature makes it very easy to detect the vulnerabilities and other factors. We can make new policy according to it. Policy creation is very simple in Check Point. Because the logs are very good in Check Point Firewall, this reduces our work with the reports that we are getting from the Threat Management. It is very convenient for us to use the reports to make new policies for security and other things.
It has various features, like Threat Prevention and Antivirus. It is easier to use and have knowledge of a single device rather than multiple devices/technologies when doing an installation. It is also easy to use because of having Antivirus and Threat Prevention features within the same firewall.
The packet inspections have been a strong point. Our identity collectors have also been helpful. In many ways, Check Point has been a step up from our SonicWalls that we had in-house before that. There's a lot of additional flexibility that we didn't have before.
The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily.
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.
I love the interface of R.80.30. The R.80 interface is very nicely thought out with everything in one place, which makes Check Point easier to use.
They have very good support. In critical scenarios, they provide us very quick solutions, are very well-trained, and have a good knowledge about the product. That is what we expect from them.
The most valuable feature is the centralized management, which gives us control over all of the Check Point gateways.
Check Point definitely has a great architecture, where you can just enable the software blades and deploy a secure service. Overall, it provides ease of deployment and ease of use.
My favorite feature is the UTM piece and that was the main reason we bought it. It helps us to fine tune the network.
The firewall feature and DDoS Protector, when turned on, keep away attacks from the outside. They also prevent users from accessing things on the Internet that they are not supposed to access.
The biggest thing is the central management. It is quite good and allows us to manage the different firewalls from it. We can implement and configure many firewalls and push our policies to them as well.
The application authentication feature of Check Point is the most valuable as it helps us keep users secure.
The most valuable features are the security blades and the ease of managing the policies, searching log for events, and correlating them.
One of the most valuable features is the data center object integration with Azure. We are using Azure a lot and there is very nice synchronization between the objects in Azure, and it's very easy to implement rules using this feature.
The most valuable feature of the firewall is the packet inspection. That is an amazing feature from Check Point.
It provides a central station where it is very easy to deploy our firewall policy in one click to many firewalls. This is one of the leading perks. It saves time by having one central station because I can deploy the same kind of policy to many firewalls at once.
The most valuable feature for us is the VSX, the virtualization.
The Anti-Spoofing has the ability to monitor the interfaces. Suppose any spoofed IP addresses are coming from an external interface, it won't allow them. It will drop that traffic. You have two options with the Anti-Spoofing: prevent or detect. If any kind of spoof traffic is coming through the external interface, we can prevent that.
The feature I like the most is their central management, the Smart controller which you can use to manage all the firewalls from one location... Being able to access almost everything in one location — manage all your gateways and get all your logs — for me, is the best feature to work with.
It also gives us a single console for everything. Rather than having one device for URL filtering and a different device as a firewall, this gives us everything in one place.
In R80.10 and above, you can view logs in SmartConsole. You don't have to open another smart tracker to view logs. That is the improvement Check Point has done which makes it better because it is much easier to find logs. This saves time, approximately 40 to 50 a day in one shift.
The simplicity of the access control is the most valuable feature for us. It gives us the ability to easily identify traffic that is either being allowed or denied to our network.
The central management makes it easier, and is a time-saver, when implementing changes.
We like the centralized management for configuring multiple firewalls. It also gives us the Antivirus, threat prevention, and vulnerability tests. These four features protect the environment with security checks. Vulnerability tests allow us to configure changes that can protect the environment.
Check Point has a lot of features. The ones I love are the antivirus, intrusion prevention, and data loss prevention. Apart from that, there is central management through which we can integrate all the firewalls and support them. It makes it easy to manage all the firewalls.
It gives us centralized management for multiple firewalls. For example, if I want to push the same configuration in 10 firewalls, I can push it all at once with the help of the centralized management system.
The management platform and the dashboard, the graphical user interface, is one of the best, if not the best, in the business. It's the most intuitive and it's really user-friendly in day-to-day operations.
The Check Point API let me make 100 net rules in just 10 minutes, which saved us time.
AV, IPS, AntiSpam, Sandbox. That's gentlemen set for any basic security, and it was implemented very well. In our reports, the most exciting results belong to AV and IPS. It can be explained by using ThreatCloud - a global knowledge base, which accumulates signatures for all existing and new coming malware, and all the Check Point solutions are always up to date with potential threats.
It secures my organization. With the application blade, I can make security as application based and the custom application is also very useful. With identity awareness blades we get insights on our local users who are accessing/passing through the respective rule as users. We also use the DLP, IPS, and VPN features.
Advanced logging capabilities: Check Point generates extensive logs which may be very useful to figure out the issues. Its logs also contain too much information which can be used to modify the policy as per user need and organizational security environment. The same can be used to figure out probable attack surface or necessary steps for mitigation.
Check Point is able to satisfy almost any security tool for enterprise clients. This allows us to deploy complex changes from a single management interface, get better visibility, and significantly reduce operational complexity.
Now we can add application signature in the same rule base & don't have to create a different policy for that.
Apart from it having very good features, I personally like the vulnerability assistance via report management which detects host and network vulnerability.
Check Point Next-Gen firewall provides security to Internal IT infrastructure with its high-performance hardware & throughput we can use redundancy.
The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing this solution we have to rely on the Cisco ACLs and Zone-Based firewall that we had configured on switches and routers, which in fact a simple stateful firewall, and currently not an efficient for protecting from advanced threats.
The interface and the IPS intrusion prevention are the most valuable features of this solution.
Everything can be managed from a single dashboard nowadays.
It is easy to deploy or upgrade. There is no need to do this manually with commands. This solution can be set up online.
The most valuable features for us are identity awareness, IDS and IPS, and application control.
The scalability is very good.
The most valuable features are application control, regulation, and threat prevention.
The most valuable feature is the Stateful Inspection, which was developed by Check Point.
Check Point is very administrator-friendly and the SmartDashboard is easy to use.
SmartCenter and SmartLog are the best platforms to manage firewall rules. SandBlast Zero-Day is very useful when encountering any security leaks.
With the new SmartTask offered in R80.40, we will be happy to configure some automatic control-functions.
The best feature is the ability to increase the capacity of the solution by exactly what you add, not losing anything for High Availability.
The rules are very easy to deploy and can be optimized pretty quickly.
The most valuable feature is that we are protected against zero-day threats.
The solution is easy to use. I like the monitoring the most.
We use Check Point to complete the network compliance rules.
The initial setup was very straightforward. You can customize it and change it as you need.
We never had an outage of the appliances or the consoles. Stability is very strong. I never had a problem related to stability.
It is easy to configure and it is a valuable antivirus protection. I especially like the IPS feature of this product.
It filters unwanted traffic.
The most valuable feature is the IPsec VPN.