Network Security Specialist at a government with 1,001-5,000 employees
Real User
Top 20
2019-09-11T10:12:00Z
Sep 11, 2019
As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.
We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Network and Security Manager at a financial services firm with 1,001-5,000 employees
Real User
2019-08-04T07:38:00Z
Aug 4, 2019
It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution.
The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.
Check Point CloudGuard Network Security is designed to secure cloud assets, offering robust firewall capabilities and protection for both internal and external traffic across AWS, Azure, and on-premises environments.
Enterprises rely on Check Point CloudGuard Network Security for comprehensive network protection, threat prevention, and compliance enforcement. Supporting virtual machines and hybrid environments, it delivers advanced security measures including intrusion prevention and...
The most valuable feature for us is the cluster support.
As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.
A unique architecture makes this product stand out from other solutions.
The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features.
We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.
The program is very stable.
The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM.
It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution.
The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.