The usual use case is to use it as an end-user proxy, filter websites based on their category and reputation, and prevent malware from entering the enterprise.
Our clients use it to access the web portal. If your requirement is there, like Web Gateway accessing, then we suggest to go with the WAF formula. For WAF only.
I use the solution in my company since we use it to manage traffic. The tool helps my company to maintain decorum and compliance policies by blocking the sites. With the tool in our company, we can keep track of the usage across the company, and it helps allow and disallow third-party migrations and connections.
We use the solution for web traffic filtering. We also create policies to block unwanted information from going out or coming into our enterprise. We also want to understand user behavior and the type of sites the users are looking at. It gives us more security because we can block the sites that try to interfere with our network.
Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes. Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.
Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2023-01-05T15:05:00Z
Jan 5, 2023
Check Point Web Gateway is one of the tools that we use in our company in order to prevent any malicious attacks that could affect the infrastructure. With this tool, we have increased the filtering for vulnerabilities across all the traffic of collaborators in order to avoid all types of malware. One of the main objectives was to have a solution compatible with Azure and on-premise solutions for a hybrid infrastructure.
We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.
We needed to be able to filter traffic, to avoid consumption of resources, and to avoid loss of unnecessary bandwidth so we can use the resources correctly. We needed to control sites since some consumptions do not represent and should not be allowed within the network by the company. Creating policies to be able to segment, allow, and block depending on the profiles created has been helpful. We also needed to validate the access behavior through monitoring to determine what additional rules we could provide to improve security.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment. Protecting us from modern threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need. Then we were allowed to try this type of tool and see the results.
Cloud Support at a tech company with 51-200 employees
User
2022-06-03T05:20:00Z
Jun 3, 2022
Our implementation was carried out to be able to further filter the vulnerabilities that we had regarding the traffic or internet access that our collaborators had in order to avoid malware or malicious applications that could affect our infrastructure. It gave us the opportunity to test this product, which together with its other tools (such as application control or antivirus) managed to effectively complement each other to achieve a more secure infrastructure.
Many of our clients use Check Point Web Gateway as a cloud base, firewall, and DPI for their security assets. All of this is deployed on the cloud. Because we are the service provider, we can use the SDN technology to connect to our customer and take the traffic to the Check Point cloud.
We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites. With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.
Check Point Web Gateway is a cloud-based network security solution that provides multilayered security for company websites. It establishes site-to-site VPNs, protects cloud environments, filters traffic and URLs, and prevents malware and other threats. The solution is cloud-based and easy to manage; it offers granular policies and generates personalized reports and statistics.
Check Point Web Gateway has helped organizations improve security by protecting company assets and users,...
The usual use case is to use it as an end-user proxy, filter websites based on their category and reputation, and prevent malware from entering the enterprise.
Our clients use it to access the web portal. If your requirement is there, like Web Gateway accessing, then we suggest to go with the WAF formula. For WAF only.
I use the solution in my company since we use it to manage traffic. The tool helps my company to maintain decorum and compliance policies by blocking the sites. With the tool in our company, we can keep track of the usage across the company, and it helps allow and disallow third-party migrations and connections.
I use the solution to check and control the traffic.
Check Point is a very closed technology that filters internet traffic.
We use the solution for web traffic filtering. We also create policies to block unwanted information from going out or coming into our enterprise. We also want to understand user behavior and the type of sites the users are looking at. It gives us more security because we can block the sites that try to interfere with our network.
Mainly, we use the solution for the banking industry. We use it for mobile banking applications, e-commerce, and payment gateways.
Roaming users use the secure web gateway. We also use the tool for application filtering and web filtering.
Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes. Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.
Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.
Check Point Web Gateway is one of the tools that we use in our company in order to prevent any malicious attacks that could affect the infrastructure. With this tool, we have increased the filtering for vulnerabilities across all the traffic of collaborators in order to avoid all types of malware. One of the main objectives was to have a solution compatible with Azure and on-premise solutions for a hybrid infrastructure.
We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.
We needed to be able to filter traffic, to avoid consumption of resources, and to avoid loss of unnecessary bandwidth so we can use the resources correctly. We needed to control sites since some consumptions do not represent and should not be allowed within the network by the company. Creating policies to be able to segment, allow, and block depending on the profiles created has been helpful. We also needed to validate the access behavior through monitoring to determine what additional rules we could provide to improve security.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment. Protecting us from modern threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need. Then we were allowed to try this type of tool and see the results.
Our primary use for Check Point Web Gateway is network security.
Our implementation was carried out to be able to further filter the vulnerabilities that we had regarding the traffic or internet access that our collaborators had in order to avoid malware or malicious applications that could affect our infrastructure. It gave us the opportunity to test this product, which together with its other tools (such as application control or antivirus) managed to effectively complement each other to achieve a more secure infrastructure.
Many of our clients use Check Point Web Gateway as a cloud base, firewall, and DPI for their security assets. All of this is deployed on the cloud. Because we are the service provider, we can use the SDN technology to connect to our customer and take the traffic to the Check Point cloud.
It is primarily used for highlighting the threats that are coming from various locations. We are using its latest version.
We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites. With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.
Our primary use case for this solution is as firewall and, because I'm a student, when I work on my studies.