Advisor at Rossell Techsys (Division of Rossell India Limited)
Real User
Top 20
2024-02-20T12:08:00Z
Feb 20, 2024
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations.
Security Consultant at a consultancy with 501-1,000 employees
Real User
Top 5
2023-06-26T14:23:26Z
Jun 26, 2023
Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time.
Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses.
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
I think that the computing power that this solution has The power to centralize more than one of the solutions or apliance is part of what I find pleasant and I think that any other engineer from the same community could see it in the same way
Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it.
With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future.
The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with.
Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere.
Presales engineer cybersecurity expert en ElevenPaths at Telefónica
Real User
2021-09-13T15:33:00Z
Sep 13, 2021
The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms.
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees
User
2021-07-16T04:05:00Z
Jul 16, 2021
The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product.
Works at a financial services firm with 5,001-10,000 employees
Real User
2021-05-18T15:54:00Z
May 18, 2021
It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2021-03-23T07:32:00Z
Mar 23, 2021
The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration.
The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T17:00:00Z
Jul 23, 2020
As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.
The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us.
I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.
It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.
Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.
Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model....
We can easily push the policies to any of our gateways.
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations.
It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.
The solution is easy to use and comes with few vulnerabilities. You don't have to worry about release upgrades. Life cycle management is very easy.
Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time.
Security Management gives us complete visibility into our security operations, allowing administrators to identify and address problem areas, reduce unnecessary costs, and improve efficiency. It offers detailed reports on network usage and security, which helps my company to monitor and control its security expenses.
The interface is very intuitive.
The reporting system provides real-time insights into the security situation and shows measures that can be taken to protect our data.
Each department can easily share data with the management without fear of data compromise.
I think that the computing power that this solution has The power to centralize more than one of the solutions or apliance is part of what I find pleasant and I think that any other engineer from the same community could see it in the same way
It provides for capabilities and has allowed us to be more scalable.
Being able to install a version of Check Point Security Management helps us avoid the expense of creating a server dedicated to that function, and we save on equipment and technical personnel in installing it, which in the end accelerates the administration and management of equipment to connect to it.
With the generation and review of logs, we have verified some vulnerabilities and attempted attacks to generate improvements in our infrastructure and policies to help avoid issues in the future.
Check Point Security Management has a great feature that allows you to automate the request of the automated server.
HA Structure provides good coverage and works fine.
The control is granular, so you can set policy profiles for different organizational profiles.
We can track logs of each firewall which is very helpful.
The log dashboard in the SmartConsole is very useful and convenient for monitoring and tracking.
We are now able to monitor the different VPN communities in real-time.
The interface also makes it easy for us to configure the VPN from the GUI rather than the command line, which makes it easy even for less experienced engineers to work with.
The layered architecture is really understandable and easy to use.
The rulebase management and the shared layers concept is implemented well.
The cluster solution made our job easier any fault to the device will not halt entire internet connectivity.
It does not affect the performance of the other servers for which one as a client can have total peace of mind in these environments.
Check Point has been very effective in terms of threat management and comprehensive protection against vulnerabilities, and it has given us confidence that our data is not going anywhere.
This solution is easy to install and deploy. It is also user-friendly.
The management API is the best new feature for me. It allows us to further automate our customers' automated server ordering.
We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic.
The fact that everything starts from the same unified management console makes it very easy to integrate new equipment or functionalities once the operator has become familiar with it, as everything will follow similar management or operation mechanisms.
The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console.
Mobile access has helped us cater to more than 4000 users so that they can work from home.
The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product.
Check Point Security Management has improved our organization because all corporate firewalls can be managed with a single interface.
It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.
The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration.
The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other.
The most valuable feature for me is Identity Awareness.
As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution.
The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us.
I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when.
The firewall's blades are the solution's most valuable feature.
It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful.
URL filtering is a very important feature.
Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN.