We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
The main function is to securely manage and deploy configurations to firewall devices and logs through its security management console. We configure and test all settings within the security manager and subsequently push these configurations to the relevant firewall devices.
We utilize the security management solution to oversee all our Check Point products, including firewall, IPS, and antivirus policies. It serves as our primary tool for managing all Check Point devices.
Advisor at Rossell Techsys (Division of Rossell India Limited)
Real User
Top 20
2024-02-20T12:08:00Z
Feb 20, 2024
We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Consultant, Reseller and IT Infrastructure Projects at Elytelec
Real User
Top 10
2023-10-05T16:13:15Z
Oct 5, 2023
Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.
Security Consultant at a consultancy with 501-1,000 employees
Real User
Top 5
2023-06-26T14:23:26Z
Jun 26, 2023
I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.
We needed a solution that had the things required to keep the company secure, like confidentiality, centralization, and a range of technological services. There weren't many other leading solutions that allowed us to achieve our goal of centralizing most security resources in one place to achieve rapid, unified management and control of our assets, achieve our annual goals, and provide the best service.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2023-01-04T15:28:00Z
Jan 4, 2023
Check Point Security Management is mainly used for the management of rules through the control panel. A large part of our infrastructure was migrated to the Azure cloud, and the other part was on-premise. We have a hybrid cloud, and this tool helped us to rule management we also use the management APIs to apply large configurations and block IP addresses with SAM rules. For VLAN migrations, we also implemented a management HA that helps us provide synchronization of firewall rules.
The security management platform monitors the performance of applications and the security demands that can secure our data. Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. This product provides comprehensive security coverage services that reduce operational costs. This tool has educated our teams and advanced our knowledge of setting effective security.
The application intervenes in security situations in the organization and launches advanced threat prevention measures. It has automated security controls that can predict and block malware attacks. It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. Data fraud cases have reduced since we set up this product as the main security assessment platform. Employees can safely browse and share files with their colleagues without fear of external interference.
When having multiple branches, there is the need to be able to manage several branches centrally to meet internal and external regulatory standards that become part of important criteria to manage security. Due to the number of branches that we must protect and safeguard, we were looking for a solution that would allow us to centralize simple and fast management that is as scalable as possible.
We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.
The use of this tool is for the administration of policies, control, monitoring, and all the management of our gateway security tool. The separation of these environments has given us a robust solution in which we can apply and protect all the configurations created in our gateways without being afraid if we lose or damage the Check Point Security Management solution. Nothing bad would happen since we can create the environment again at the Microsoft Azure level and later restore the backup without being affected. It also provides us with the required reports on perimeter security.
One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records. With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration
Senior Information Security Specialist at AKBANK TAS
Real User
Top 10
2022-07-30T08:12:00Z
Jul 30, 2022
We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether. We are using management API to apply large configs, clear rules, block malicious IP addresses with SAM rules, and migrate the VLANs with it. We deployed a management HA to provide rulebase synchronization to our DRC firewall segments. We also distributed logs to different Smart-1 appliances to gain performance.
Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities. Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.
We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls. The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated. Check Point's solution cuts down on the time it takes to manage multiple firewall devices.
With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand
We are managing Check Point firewalls worldwide, and establishing VPNs between the main data centers in geographic regions and the other agencies worldwide. We also establish VPNs between agencies and customers depending on the need. Several different VPN communities are used. We also establish VPNs with customers and partners with different firewall brands (Cisco, Fortinet, Juniper, etc.). We manage security policies for more than 300 hundred Check Point firewalls by using security policy templates and models.
The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.
Contracted IT Staff at Sağlık Bakanlığı-Turkish Ministry of Health
Real User
2022-05-06T18:48:00Z
May 6, 2022
Security Management Server is easy to configure. We have more than six security gateways in different locations. It is easy to manage security gateways separately from Security Management Server. Also, we use a security management server as a log collector. Security Management Server is easy to configure.
Sr. Security Infrastructure Engineer at NTT Security
Real User
2022-05-06T12:41:00Z
May 6, 2022
As a consultant for a security infrastructure consulting firm, I install and integrate this solution at client premises. There are many types of client domains, such as financials, government, healthcare, etc. It's a stable and complete product that is easy to use and capable of managing their next-gen firewall infra around the globe without compromises. Once the Check Point infra is up and running, clients really appreciate its capabilities of centrally managing security rules, making traffic flows visible, and quick detection and response capabilities in case of issues.
We use the solution for ensuring the on-premise and cloud-based infrastructure through the Check Point gateway solution. We're applying the solution to the endpoint and running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance. As compared to the other vendors like CISCO ASA, Juniper, and other vendors it's nice to see maximum futures in the single firewall. The site and remote VPN deployment are very easy and troubleshooting the issues is also very easy.
Cloud Support at a tech company with 51-200 employees
User
2022-05-04T01:24:00Z
May 4, 2022
The use of this tool was to be able to unify our control of Check Point gateways. With this and in a non-centralized way, we were able to manage everything we required through the blades installed in our management and, in this way, easily unite various environments both Microsoft Azure and on-premise. We developed this environment in an Azure VM since Check Point provides the correct appliance. In addition to that, we also joined local gateway environments and everything worked correctly as expected.
System Engineer Network & Security at a retailer with 10,001+ employees
Real User
2021-11-22T09:37:00Z
Nov 22, 2021
We primarily use the solution for the management of thousands of rules. partially automated via the well-documented API. Managing the rules is a day-to-day business that takes a lot of time. It is really good that we can do the management through the dashboard. It is so comfortable, and, in contrast to other manufacturers, is structured much better. The integration of the logs allows a quick jump by mouse click between rules and log entry. The API reduces the administrative effort so that we can concentrate on the essential things. in addition, it is an enormous advantage for our customers that rules are created automatically and are available immediately.
Network Security Engineer at Atlantic Data Security
User
2021-11-19T18:38:00Z
Nov 19, 2021
We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.
Presales engineer cybersecurity expert en ElevenPaths at Telefónica
Real User
2021-09-13T15:33:00Z
Sep 13, 2021
Throughout my professional career I have operated, implemented, and designed solutions with Checkpoint's NGFW for clients of all kinds - public and private, small and large. For all scenarios, there is a suitable solution with this manufacturer. Its decades of experience make it one of the undisputed leaders in the industry. In recent times, the platform has evolved significantly to meet the latest threats. I would recommend at least valuing it as an option whenever an opportunity arises to cover cybersecurity needs.
We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard. It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly. Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces. It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.
Assistant Manager IT Operation at Datamatics Global Services Limited
Real User
2021-08-25T04:48:00Z
Aug 25, 2021
We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow.
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees
User
2021-07-16T04:05:00Z
Jul 16, 2021
I work for one of the biggest Australian banks that rely on Check Point firewalls for security enforcement across several points in the infrastructure environment. The Security Management platform is a key component for our operation, in that it enables efficient central management for configuration and security troubleshooting. This centralised component facilitates and adds value to our daily operations, creating a single place for configurations and a platform that can present security logs that are used for the troubleshooting of security issues.
ICT at a manufacturing company with 501-1,000 employees
Real User
2021-06-16T13:31:00Z
Jun 16, 2021
We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2021-03-23T07:32:00Z
Mar 23, 2021
We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system. Two separate packages are created for both perimeter & internal sets. We are also managing a SandBlast device via Security Management. Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.
Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.
We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T17:00:00Z
Jul 23, 2020
Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.
We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.
Check Point Security Management is an advanced security management platform for enterprises. The platform integrates all aspects of security. A single platform manages the entire infrastructure, from data centers to private/public cloud deployments.
Check Point Security Management is a reliable and easy-to-use security platform. It integrates all aspects of your security environment to strengthen the security posture without impairing productivity. The system has a layered policy model....
We work with multiple security tools, including network security and information security solutions. Our primary use case includes using Check Point and other tools like CyberArk for privilege access management, Cisco, and WebSight CloudSec.
We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.
The main function is to securely manage and deploy configurations to firewall devices and logs through its security management console. We configure and test all settings within the security manager and subsequently push these configurations to the relevant firewall devices.
We utilize the security management solution to oversee all our Check Point products, including firewall, IPS, and antivirus policies. It serves as our primary tool for managing all Check Point devices.
We use the solution mostly for policy pushing to other gateways.
We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.
Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.
We use Check Point Security Management for firewall management.
I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.
We needed a solution that had the things required to keep the company secure, like confidentiality, centralization, and a range of technological services. There weren't many other leading solutions that allowed us to achieve our goal of centralizing most security resources in one place to achieve rapid, unified management and control of our assets, achieve our annual goals, and provide the best service.
Check Point Security Management is mainly used for the management of rules through the control panel. A large part of our infrastructure was migrated to the Azure cloud, and the other part was on-premise. We have a hybrid cloud, and this tool helped us to rule management we also use the management APIs to apply large configurations and block IP addresses with SAM rules. For VLAN migrations, we also implemented a management HA that helps us provide synchronization of firewall rules.
The security management platform monitors the performance of applications and the security demands that can secure our data. Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. This product provides comprehensive security coverage services that reduce operational costs. This tool has educated our teams and advanced our knowledge of setting effective security.
The application intervenes in security situations in the organization and launches advanced threat prevention measures. It has automated security controls that can predict and block malware attacks. It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. Data fraud cases have reduced since we set up this product as the main security assessment platform. Employees can safely browse and share files with their colleagues without fear of external interference.
When having multiple branches, there is the need to be able to manage several branches centrally to meet internal and external regulatory standards that become part of important criteria to manage security. Due to the number of branches that we must protect and safeguard, we were looking for a solution that would allow us to centralize simple and fast management that is as scalable as possible.
We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.
The use of this tool is for the administration of policies, control, monitoring, and all the management of our gateway security tool. The separation of these environments has given us a robust solution in which we can apply and protect all the configurations created in our gateways without being afraid if we lose or damage the Check Point Security Management solution. Nothing bad would happen since we can create the environment again at the Microsoft Azure level and later restore the backup without being affected. It also provides us with the required reports on perimeter security.
One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records. With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration
We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether. We are using management API to apply large configs, clear rules, block malicious IP addresses with SAM rules, and migrate the VLANs with it. We deployed a management HA to provide rulebase synchronization to our DRC firewall segments. We also distributed logs to different Smart-1 appliances to gain performance.
Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities. Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.
We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls. The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated. Check Point's solution cuts down on the time it takes to manage multiple firewall devices.
With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand
We are managing Check Point firewalls worldwide, and establishing VPNs between the main data centers in geographic regions and the other agencies worldwide. We also establish VPNs between agencies and customers depending on the need. Several different VPN communities are used. We also establish VPNs with customers and partners with different firewall brands (Cisco, Fortinet, Juniper, etc.). We manage security policies for more than 300 hundred Check Point firewalls by using security policy templates and models.
The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.
Security Management Server is easy to configure. We have more than six security gateways in different locations. It is easy to manage security gateways separately from Security Management Server. Also, we use a security management server as a log collector. Security Management Server is easy to configure.
As a consultant for a security infrastructure consulting firm, I install and integrate this solution at client premises. There are many types of client domains, such as financials, government, healthcare, etc. It's a stable and complete product that is easy to use and capable of managing their next-gen firewall infra around the globe without compromises. Once the Check Point infra is up and running, clients really appreciate its capabilities of centrally managing security rules, making traffic flows visible, and quick detection and response capabilities in case of issues.
We use the solution for ensuring the on-premise and cloud-based infrastructure through the Check Point gateway solution. We're applying the solution to the endpoint and running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance. As compared to the other vendors like CISCO ASA, Juniper, and other vendors it's nice to see maximum futures in the single firewall. The site and remote VPN deployment are very easy and troubleshooting the issues is also very easy.
The use of this tool was to be able to unify our control of Check Point gateways. With this and in a non-centralized way, we were able to manage everything we required through the blades installed in our management and, in this way, easily unite various environments both Microsoft Azure and on-premise. We developed this environment in an Azure VM since Check Point provides the correct appliance. In addition to that, we also joined local gateway environments and everything worked correctly as expected.
I mainly use this solution for endpoint security, to capture data with a secure approach.
This solution is used to control OPC's. You are also able to generate reports with it.
We primarily use the solution for the management of thousands of rules. partially automated via the well-documented API. Managing the rules is a day-to-day business that takes a lot of time. It is really good that we can do the management through the dashboard. It is so comfortable, and, in contrast to other manufacturers, is structured much better. The integration of the logs allows a quick jump by mouse click between rules and log entry. The API reduces the administrative effort so that we can concentrate on the essential things. in addition, it is an enormous advantage for our customers that rules are created automatically and are available immediately.
We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.
Throughout my professional career I have operated, implemented, and designed solutions with Checkpoint's NGFW for clients of all kinds - public and private, small and large. For all scenarios, there is a suitable solution with this manufacturer. Its decades of experience make it one of the undisputed leaders in the industry. In recent times, the platform has evolved significantly to meet the latest threats. I would recommend at least valuing it as an option whenever an opportunity arises to cover cybersecurity needs.
We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard. It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly. Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces. It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.
We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow.
I work for one of the biggest Australian banks that rely on Check Point firewalls for security enforcement across several points in the infrastructure environment. The Security Management platform is a key component for our operation, in that it enables efficient central management for configuration and security troubleshooting. This centralised component facilitates and adds value to our daily operations, creating a single place for configurations and a platform that can present security logs that are used for the troubleshooting of security issues.
We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.
We use it for both perimeter and internal defense.
We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system. Two separate packages are created for both perimeter & internal sets. We are also managing a SandBlast device via Security Management. Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.
Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.
We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.
Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.
We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.
We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.
We are primarily using the solution as a firewall, and for some IPS features as well.
This solution is used to validate the firewalls, and it performs this function very well.
Perimeter protection. It has performed well. It's good.