We changed our name from IT Central Station: Here's why

Check Point Antivirus Primary Use Case

JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.

View full review »
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.

View full review »
DB
Assistant Manager at CIANS ANALYTICS PVT. LTD

We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.

We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. 

Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.

View full review »
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,599 professionals have used our research since 2012.
LA
Network, Systems and Security Engineer at SOLTEL Group

We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions.

It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software.

Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.

View full review »
GH
Network Operations Engineer at SFR

We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways. 

Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats. 

We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.

View full review »
PP
ciso at SDIS49

We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.

View full review »
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,599 professionals have used our research since 2012.