Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Real User
Top 5
2024-09-25T13:07:00Z
Sep 25, 2024
We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.
We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 5
2023-10-11T13:12:00Z
Oct 11, 2023
Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.
We required a product recognized for its brand visibility and achievements in cybersecurity at a global level. Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.
Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.
Information Technology Specialist at Tech Mahindra
Real User
Top 5
2022-12-28T03:51:00Z
Dec 28, 2022
Check Point Antivirus is a highly compatible and productive security management software application for my system and console that runs in the background without hampering my projects. Check Point Antivirus scrutinizes everything in-depth and looks for threats and malware, including phishing applications. Check Point Antivirus is easy to install, set up, and integrate, with a very user-friendly dashboard and helpful support. Check Point Antivirus administers the user experience and provides extensive support and services as needed.
Check Point Antivirus has proven to be a savior. It helps in protecting our computers and other e-devices at endpoints from malicious ransomware, etc. It actively eliminates malware and protects the system from any potential damage. It is well-performing antivirus software that is absolutely different from traditional threat-combating antivirus tools. Conventional antivirus software is often not upgraded enough to fight advanced threats. Check Point Antivirus's performance efficiency is quite good and is highly recommended by peers.
The primary use case of Check Point Antivirus is to protect our machines and data from viruses and to clean our systems from all malware to ensure the security of our data and servers from external threats and invasions. We have configured Check Point antivirus with all our machines, servers, and databases as a security solution against real-time virus threats that may harm our systems. It has been easy to configure and provides up-to-date advanced-level protection. Remote management is also being used to remove any potential viruses from users' machines if found.
This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system. It's one of the best software to have and increases the security checks for various verticals. It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources. It came highly recommended by peers in different fields. Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.
Due to many attacks in our country, we decided to look for a robust solution to avoid current threats, including ransomware among others. Our company was looking to protect our infrastructure or perimeter, but due to constant attacks in our country with modern threats to computer systems, we decided to use a tool that can provide us with the correct security. In addition to validating that we could include it in our Check Point environment in a simple way. The simple administration gave us the ability to provide greater security with the company's permission, avoiding threats such as malware, among others. We currently have this resource and we can manage and verify it from our management server.
Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.
We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines.
The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point security management. It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy. It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.
We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter. We have two security gateway and one security management server which is running R81 gaia OS. We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection. Check Point Antivirus continuously scans each and every file before reaching the destination.
I work in a technologically advanced environment of data analytics and data mining services. We are experts in providing management consulting in the field of financial audit and data analytics for corporates to determine future business projections. We use a large number of tech tools and software with APIs with various platforms and portals of different vendors and clients' systems. Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks.
Cloud Support at a tech company with 51-200 employees
User
2022-05-16T18:30:00Z
May 16, 2022
Our use of the application is for all computers that may be affected by malware and viruses within the organization, thus avoiding data loss problems or zero-day threats. For this, we integrate the Check Point antivirus blade together with our Check Point gateway R81, and through the administration of the infinity portal, the protection required for all our services within our corporate network. We are really satisfied with this implementation. It is important to always add the antivirus to the GWs license in order to implement it effectively.
We primarily use the solution as antivirus, antimalware, et cetera. It's standard antivirus software. Every PC must have an antivirus on it in our organization.
Network Security Engineer at Maine Bureau Of Taxation
Real User
2022-01-31T14:41:00Z
Jan 31, 2022
We use the Check Point Maestro for data center firewalls. It has the ability to spread the load across multiple devices and still only have one source of management, which is incredible. Plus, everything duplicates across the firewalls without manual intervention. We are currently moving from a flat network into this setup, and, with the amount of traffic that we are going to be sending through the firewalls, this is the only way it could have been done. Also, the product offers the ability to have little to no downtime during patching. This setup is a beast!
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways. Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats. We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses. We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-04-12T12:25:00Z
Apr 12, 2021
We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions. It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software. Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.
The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.
The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind. There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.
Check Point Antivirus is a robust software solution providing a dynamic next-generation group of applications that protect computers and devices by removing malicious software or code specifically created to corrupt computers or data.
In today’s busy marketplace, malware is advancing so expeditiously that it is estimated a new malware instance is generated almost every second. It is widely understood that traditional antivirus solutions on their own are no longer sufficient as they once...
We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.
We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
The solution helps to protect our networks.
We use Check Point Antivirus to secure our enterprise network. It protects our data servers from malware attacks.
Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.
Our primary use case is to protect endpoints.
We use Check Point for ransomware protection. It provides standard endpoint protection.
We required a product recognized for its brand visibility and achievements in cybersecurity at a global level. Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.
Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.
We use this product as an endpoint antivirus solution.
Check Point Antivirus is a highly compatible and productive security management software application for my system and console that runs in the background without hampering my projects. Check Point Antivirus scrutinizes everything in-depth and looks for threats and malware, including phishing applications. Check Point Antivirus is easy to install, set up, and integrate, with a very user-friendly dashboard and helpful support. Check Point Antivirus administers the user experience and provides extensive support and services as needed.
Check Point Antivirus has proven to be a savior. It helps in protecting our computers and other e-devices at endpoints from malicious ransomware, etc. It actively eliminates malware and protects the system from any potential damage. It is well-performing antivirus software that is absolutely different from traditional threat-combating antivirus tools. Conventional antivirus software is often not upgraded enough to fight advanced threats. Check Point Antivirus's performance efficiency is quite good and is highly recommended by peers.
The primary use case of Check Point Antivirus is to protect our machines and data from viruses and to clean our systems from all malware to ensure the security of our data and servers from external threats and invasions. We have configured Check Point antivirus with all our machines, servers, and databases as a security solution against real-time virus threats that may harm our systems. It has been easy to configure and provides up-to-date advanced-level protection. Remote management is also being used to remove any potential viruses from users' machines if found.
This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system. It's one of the best software to have and increases the security checks for various verticals. It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources. It came highly recommended by peers in different fields. Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.
We use Check Point Antivirus for cyber security purposes.
Due to many attacks in our country, we decided to look for a robust solution to avoid current threats, including ransomware among others. Our company was looking to protect our infrastructure or perimeter, but due to constant attacks in our country with modern threats to computer systems, we decided to use a tool that can provide us with the correct security. In addition to validating that we could include it in our Check Point environment in a simple way. The simple administration gave us the ability to provide greater security with the company's permission, avoiding threats such as malware, among others. We currently have this resource and we can manage and verify it from our management server.
Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.
We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines.
The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point security management. It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy. It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.
We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter. We have two security gateway and one security management server which is running R81 gaia OS. We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection. Check Point Antivirus continuously scans each and every file before reaching the destination.
I work in a technologically advanced environment of data analytics and data mining services. We are experts in providing management consulting in the field of financial audit and data analytics for corporates to determine future business projections. We use a large number of tech tools and software with APIs with various platforms and portals of different vendors and clients' systems. Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks.
Our use of the application is for all computers that may be affected by malware and viruses within the organization, thus avoiding data loss problems or zero-day threats. For this, we integrate the Check Point antivirus blade together with our Check Point gateway R81, and through the administration of the infinity portal, the protection required for all our services within our corporate network. We are really satisfied with this implementation. It is important to always add the antivirus to the GWs license in order to implement it effectively.
We primarily use the solution as antivirus, antimalware, et cetera. It's standard antivirus software. Every PC must have an antivirus on it in our organization.
We use the Check Point Maestro for data center firewalls. It has the ability to spread the load across multiple devices and still only have one source of management, which is incredible. Plus, everything duplicates across the firewalls without manual intervention. We are currently moving from a flat network into this setup, and, with the amount of traffic that we are going to be sending through the firewalls, this is the only way it could have been done. Also, the product offers the ability to have little to no downtime during patching. This setup is a beast!
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways. Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats. We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses. We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.
We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions. It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software. Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.
The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.
We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.
The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind. There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.