Check Point Antivirus OverviewUNIXBusinessApplication

Check Point Antivirus is the #5 ranked solution in top Anti-Malware Tools. PeerSpot users give Check Point Antivirus an average rating of 8.6 out of 10. Check Point Antivirus is most commonly compared to Microsoft Defender for Endpoint: Check Point Antivirus vs Microsoft Defender for Endpoint. Check Point Antivirus is popular among the large enterprise segment, accounting for 46% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 17% of all views.
Check Point Antivirus Buyer's Guide

Download the Check Point Antivirus Buyer's Guide including reviews and more. Updated: March 2023

What is Check Point Antivirus?

Check Point Antivirus is a robust software solution providing a dynamic next-generation group of applications that protect computers and devices by removing malicious software or code specifically created to corrupt computers or data.

In today’s busy marketplace, malware is advancing so expeditiously that it is estimated a new malware instance is generated almost every second. It is widely understood that traditional antivirus solutions on their own are no longer sufficient as they once were to defend today’s organizations against risk and malicious threats. Therefore, to be competitive and value-added, most of today’s antivirus solution providers are developing new methodologies that integrate processes such as global scanning, alerting services, leading industry collaborations, human expert threat analysis, and secure cloud integrations.

Check Point Antivirus Benefits

Check Point Antivirus has many valuable benefits. Some of its most useful benefits include:

  • Prevention: Check Point Antivirus is able to protect an organization's gateway by prohibiting malicious attacks and thereby preventing any potential damage.
  • Real-time detection: The solution immediately scans and monitors files as they are accessed by your organization’s network.
  • Rootkit detection: Antivirus thoroughly scans and blocks all malicious code designed to gain administrative access to a machine or network.
  • Heuristic detection: This dynamic new protocol was intuitively designed to comprehensively scan for any suspicious anomalies that can be found in unknown, new viruses and modified versions of known viruses.
  • Signature-based detection: Although considered basic by many in today's endpoint security culture, signature-based detection is still a foundational part of antivirus protection. This necessary process recognizes malware by comparing code in a program to the code of known virus types that have already been encountered, analyzed, and recorded in your organization’s database.
  • Dynamic bot and malware protection: The solution has the ability to provide organizations with aggressive, robust protection. Check Point Antivirus uses both a pre- and post-infection protocol to ensure comprehensive multi-tiered risk prevention. All of this is easily managed in an extremely user-friendly interface.

Reviews from Real Users

“Check Point Antivirus is the best antivirus tool in the market currently. The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.” - Shyam N., Senior Consultant at EY India

“Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).” - Hazel R., Administrative Assistant at Tecapro

Check Point Antivirus was previously known as Check Point Antivirus Software Blade.

Check Point Antivirus Customers

Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify

Check Point Antivirus Video

Check Point Antivirus Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Jhonjerlyn Morales - PeerSpot reviewer
CEO at JL Real Estate
User
Good technical support with constant updating of the EDR and good overall security
Pros and Cons
  • "New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system."
  • "Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices."

What is our primary use case?

Check Point Antivirus is being used with integrations in all our company software and also with connections to all the computers that we use in our work sectors. All areas of our company such as sales, marketing, or finance have Check Point Antivirus implemented. 

This antivirus is capable of monitoring the state of the network and knowing if there is any threat in our business network while being able to clean it up immediately. 

All departments within the company have been kept safe since day one of using Check Point. In order to connect all the computers and monitor them in real-time from the Check Point application, we use an app. From this app, you can see the status of all computers, restore them, and eliminate threats from a single panel.

How has it helped my organization?

Previously, we had trouble detecting data leaks and protecting the services we used in our business. Financial and marketing software services were the main affected areas. 

After the implementation of Check Point, our computers have remained connected to a secure network where threats are prevented from entering thanks to the EDR system, and systems have been restored to a stable state where there are no threats. 

We have kept our files safe and restored them to an original state before being affected by a threat thanks to the system recovery system. 

We are very grateful for the results obtained in recent years. Our computers (the main source of work) have remained secure. Our employees can manage online campaigns and control the flow of clients without fear of being affected by any threat; it has a system of anti-malware and anti-phishing to detect threats in time.

What is most valuable?

The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats. 

This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats. 

New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.

Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.

What needs improvement?

One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time. 

It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.

Buyer's Guide
Check Point Antivirus
March 2023
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
688,618 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this solution for about two years. We did not expect such precise and potential results and our security service has been maintained in the long term thanks to this general security on all types of devices.

What do I think about the stability of the solution?

It turned out to be an antivirus that exceeded my expectations in the long run. 

During the use that we have had in these last two years, our computers have remained protected 24 hours a day and seven days a week. On some occasions, threats have entered our computers, however, the system restore system has counteracted this without any problem. 

It has been a stable antivirus, without any real problems.

What do I think about the scalability of the solution?

The process of scaling, implementation and use went quite well; it took approximately two software engineers and three cyber security experts to successfully implement the service. They were in charge of configuring the real-time monitoring system for computers and updating the status of viruses.

How are customer service and support?

Customer service was satisfactory. 

During our implementation process, several questions arose about how the data leak detection system should be configured. All of these questions were answered immediately in a live chat with the Check Point team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I used the Microsoft service, however, it was not able to protect all the threats trying to get into our business computers. 

One of the main reasons why I stopped using the Microsoft Antivirus service, is due to the fact that it was consuming a lot of resources on the computers while it was running and while the EDR database was being updated. This directly affects the experience of our employees on the computer and limited them at work. Since we implemented the Check Point service, the consumption of resources decreased on a large scale and we managed to obtain better analysis and virus detection.

How was the initial setup?

Setting up the system was somewhat complicated, requiring several of our engineers and cyber experts to successfully implement the antivirus service. 

The initial implementation took approximately one week to set up all the company's computers and synchronize them on the same protected network.

What about the implementation team?

The implementation was done with an internal team in our company; there was no involvement of a vendor team.

What was our ROI?

Our return on investment has been the protection of the entire work structure, our administrative processes have been protected by this great EDR system, and all the devices used in our company are monitored by a system that is responsible for eliminating threats before they react. 

We are happy with the money spent on this great security software; our computers have been more protected.

What's my experience with pricing, setup cost, and licensing?

I would recommend that you have a good amount of capital to access a considerably good protection plan from Check Point. 

Currently, the prices for installation and configuration are a bit high, and small or medium-sized companies could not afford these prices. 

You need a trained team to implement the Antivirus system as quickly as possible since it is a bit difficult to configure.

What other advice do I have?

In a solution that is undoubtedly worthwhile, it has a perfect methodology for finding viruses before they react to the computer's files. 

It has a very good interface, is easy to handle, and protects all kinds of services that are being used.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Anuj - PeerSpot reviewer
Manager-BIU at Bajaj Markets
User
Compatible, cost-effective, and highly customizable
Pros and Cons
  • "Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous."
  • "Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well."

What is our primary use case?

Check Point Antivirus is a one-stop solution for businesses and professionals. It is one of the most advanced security solution software which helps businesses to secure their IT system and the installed software and hardware through antivirus protection riches one of the best and most affordable in the current item market. 

It is one of the most stable software which is globally acceptable and has numerous capabilities and multifarious features and parameters which help businesses to secure their system inside out. 

This antivirus is easily deployed and is integrated into any kind of system within a very short span of time. This antivirus software is quite compatible with various dashboards and other electronic platforms and goes well in securing the installed system in the best possible manner.

How has it helped my organization?

Check Point Antivirus has improved the security experience of our ecosystem. Due to this software, now of our workforce is more confident and carefree about any kind of threat entry into the IT system. 

This antivirus software has amazing capabilities to fight any kind of malware and ransomware in the IT system. 

This antivirus software has numerous features which result in wider acceptability and huge capabilities in diffusing threat attempts and hacking attempts.

Check Point Antivirus is a quite stable software in the market right now as this is one of the most mature and highly customizable security solutions for businesses. 

We have been widely impressed by these amazing security features and notifications which help us to have better security compliance in place and also to have up to 100% security protection from any kind of threats and endpoints.

What is most valuable?

Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.

Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.

Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.

Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.

The software is quite compatible and extremely stable in any kind of IT environment.

This software is easy to integrate and deploy in any IT environment.

We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.

What needs improvement?

There is a huge scope for improvement for any good product in the market.

Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well. If certain cost reductions can happen and can take place, then it is going to be ultimately very good for medium enterprises like us.

Also, we are requesting the customer service and the business team of Check Point to have more and more features and improved packages to increase the customer experience.

We would be grateful to the entire Check Point team if we could get some discounts and also some extended trial periods. 

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

The solution has high stability.

What do I think about the scalability of the solution?

The solution has good scalability.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a lot of other security solutions earlier. Some of them were Trend Micros Security and McAfee as well as other enterprise security solutions from Splunk.

We realized that these solutions are not very suitable for us as we need dynamic security services since our product is highly customizable and these security solutions are not fitting into the mainstream business. Due to this, we switched ourselves to Check Point and to date, we have had an exceptional experience with this partner as they are quite customizable in nature.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We implemented the solution through a vendor.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

The solution is easy with streamlined costing. Licensing is easy and renewal is seamless.

Which other solutions did I evaluate?

Yes we evaluated a lot of options before switching to Check Point, including:

  • McAfee 
  • Splunk 
  • Kaspersky
  • Trend Micro 

What other advice do I have?

This is good to go security software for any kind of business today.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Antivirus
March 2023
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
688,618 professionals have used our research since 2012.
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE
Real User
Top 5
An all-in-one solution that prevents attacks and is easy to set up
Pros and Cons
  • "It has a customer-savvy interface and easily customizable as per client and business requirements."
  • "We'd like the solution to kindly start this service offering on SaaS and PaaS models also."

What is our primary use case?

I work in a technologically advanced environment of data analytics and data mining services. We are experts in providing management consulting in the field of financial audit and data analytics for corporates to determine future business projections. We use a large number of tech tools and software with APIs with various platforms and portals of different vendors and clients' systems. Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks.

How has it helped my organization?

Check Point antivirus software is an all-in-one solution for providing system security from malware and phishing attacks from multiple systems and web sources. We are living in an era of hyper cyber threats and attacks and to tackle such threats, it is essential to have foolproof system security from all kinds of endpoints. 

The antivirus software should be able to prevent all kinds of system attacks in a smart and efficient way without harming the system configuration. It is highly cost-effective and results in an umbrella solution against all kinds of malware and spam. It provides 360 degrees in security management for web and cloud systems.

What is most valuable?

Check Point antivirus software is agile and efficient in managing spam and threat attacks on web and cloud systems. The software is extremely efficient in scanning computers and websites all the time. The software runs in the back of the system and never hampers the work at the front end.

It is highly cost-effective and saves enough manpower cost in tackling such phishing attacks on the system.

It has a customer-savvy interface and easily customizable as per client and business requirements.

Deployment is easily adjustable.

What needs improvement?

We'd like the solution to kindly start this service offering on SaaS and PaaS models also. It would help more and more small, marginal and large businesses to come forward and try the solution. Customer attraction and retention are the need of the hour.

It is highly advisable to receive more and more genuine feedback from users and publish it on websites as feedback traffic is extremely important to gauge business performance progress.

It is advised to have a longish trial period for business users as an extended trial period will help customers to assess their requirements in a better way and will greatly help in their buying decision.

For how long have I used the solution?

It's been more than two years now since I started using the solution and the experience is so far so good.

What do I think about the stability of the solution?

It is highly stable in the most fragile environments. It never breaks down.

What do I think about the scalability of the solution?

The solution is impressive and highly scalable 

How are customer service and support?

Technical support is highly responsive and attentive to any of our service requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have used the Quick Heal Total Security Antivirus solution in past and found the same little costly and ineffective in a few performance parameters which pushed me to switch from the earlier solution to Check Point.

How was the initial setup?

It is an easy deployment with no tech detailing as things were crystal clear since inception and were not at all fussy.

What about the implementation team?

We used a vendor team only. We had a good experience with them. I'd rate them five out of five. 

What was our ROI?

We've seen an ROI of almost 30%.

What's my experience with pricing, setup cost, and licensing?

Always aim to optimize the setup cost, pricing, and licensing as any overboard in these costs can backfire on the organization and business can get adversely affected.

Which other solutions did I evaluate?

We also looked at Norton, McAfee, and Trend Micro security solutions.

What other advice do I have?

It's a one-stop solution for 360-degree endpoint security management for your web and cloud systems. It provides end-to-end protection from viruses and malware attacks and strengthens our system security to the fullest. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Security Engineer at Maine Bureau Of Taxation
User
Top 20
Great technical support, no downtime, and easy to clone and expand
Pros and Cons
  • "This solution helps make sure that we can patch and keep security going without having to talk to everyone for change management."
  • "The biggest thing would be the ability to update the SMO's and gateways through Gaia instead of always completing it through the command line."

What is our primary use case?

We use the Check Point Maestro for data center firewalls. It has the ability to spread the load across multiple devices and still only have one source of management, which is incredible. Plus, everything duplicates across the firewalls without manual intervention.

We are currently moving from a flat network into this setup, and, with the amount of traffic that we are going to be sending through the firewalls, this is the only way it could have been done. 

Also, the product offers the ability to have little to no downtime during patching. 

This setup is a beast!

How has it helped my organization?

We didn't have anything before. This really creates a secure and fast solution. In order to be able to track everything coming in and out of our data center. We have a flat network and now that we are moving to this design, we needed something that can secure servers and users from each other and make sure we are only allowing what needs to be allowed and not allowing anyone to traverse the network maliciously. 

Also, we have no ability for downtime - so having this solution helps make sure that we can patch and keep security going without having to talk to everyone for change management.

What is most valuable?

Scalability is a huge factor. 

The need for no downtime is key for us - and this solution offers that. When you have six gateways you have to patch and no one even notices, it's phenomenal. 

We need to be able to keep these connections running 100% of the time. The fact that we can patch and reboot firewalls and no one even notices is a huge plus. We need to be able to keep it secure but also keep it up and running. 

Having the six gateways and being able to clone them in when we need a new gateway is excellent. I love that we are able to just put a new gateway in and clone it.

What needs improvement?

I don't really have any real suggestions for this to be improved. The biggest thing would be the ability to update the SMO's and gateways through Gaia instead of always completing it through the command line. As we train new people and have fewer hands that touch these firewalls, having a good understanding of how CLI works and how to install patches and remove patches from gateways using this method is dying. So, being able to do it the same way we do all the other gateways would be excellent.

For how long have I used the solution?

I've been using the solution for over one year.

What do I think about the stability of the solution?

I am very impressed. I didn't think anything like this would be possible.

What do I think about the scalability of the solution?

It has the MOST scalability of any product out there. You can slam another gateway in and clone it and off you go.

How are customer service and support?

We always have great support and service. I don't think any other vendor provides this level of support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have used Fortigate before, however, the management on Check Point is unrivaled.

How was the initial setup?

The setup was slightly complex to begin with. That said,  once you've set up a new connection a few times it gets easier.  

What about the implementation team?

We handled the setup with the vendor team. They are the best at Check Point!

What was our ROI?

I don't pay the bills, however, it's my understanding that there is an argument out there for ROI.

What's my experience with pricing, setup cost, and licensing?

The cost is up there. However, when you are dealing with the best, you cannot really balk at pricing.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

Check Point Support is top-notch. You cannot beat their support.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Assistant Manager at ASCI
User
Top 5Leaderboard
Great support, good threat detection, and high customization
Pros and Cons
  • "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
  • "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."

What is our primary use case?

Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. 

It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.

How has it helped my organization?

This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.

It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.

It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.

What is most valuable?

Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

What needs improvement?

Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

For how long have I used the solution?

It's been over six months now since we started using the product. It's one of the best available solutions so far.

What do I think about the stability of the solution?

The product offers high stability and flexibility.

What do I think about the scalability of the solution?

The product is quite scalable and replicable across all kinds of IT environments 

How are customer service and support?

Support is wonderful and we highly recommend them. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a few peer-recommended security solutions earlier.

How was the initial setup?

The setup is not complicated at all. We had smooth onboarding and easy deployment.

What about the implementation team?

We implemented it through a vendor.

What was our ROI?

We've seen over 75% ROI.

What's my experience with pricing, setup cost, and licensing?

It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.

Which other solutions did I evaluate?

We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.

What other advice do I have?

I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good scanning capabilities, excellent network security, and easy to configure
Pros and Cons
  • "It can scan the files that our users have downloaded to check if they have a virus."
  • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

What is our primary use case?

Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

How has it helped my organization?

It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

What is most valuable?

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security.

What needs improvement?

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

For how long have I used the solution?

Check Point Antivirus was implemented two years ago.

What do I think about the stability of the solution?

It is a very stable product. However, we've had some problems with the updates.

What do I think about the scalability of the solution?

It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

How are customer service and support?

The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Check Point as our first option.

How was the initial setup?

The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

What about the implementation team?

The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

What was our ROI?

Our ROI is that we keep all our network and equipment safe and updated.

What's my experience with pricing, setup cost, and licensing?

I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

Which other solutions did I evaluate?

As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

What other advice do I have?

Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Assistant Manager at CIANS ANALYTICS PVT. LTD
User
Top 20
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
  • "We like the sandbox feature."
  • "Technical support could be better."

What is our primary use case?

We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.

We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. 

Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.

How has it helped my organization?

When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine. 

We always receive alert emails from Check Point regarding malware or virus status, which is helpful.

What is most valuable?

We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate. 

The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine. 

Overall, the antivirus is good.

What needs improvement?

Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.

When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes. 

The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.

All other things are okay from our end.

One feature we want to add is an EDR/XDR into this antivirus module.

For how long have I used the solution?

I've been using the solution for 4 months.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.

How are customer service and technical support?

Technical support is good.

Which solution did I use previously and why did I switch?

No, we haven't used any other antivirus. It was by default in Windows.

How was the initial setup?

The initial setup was okay.

What about the implementation team?

We implement it through a vendor. 

I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.

What was our ROI?

If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.

What's my experience with pricing, setup cost, and licensing?

The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.

Which other solutions did I evaluate?

Yes, we have evaluated other options. For example, we've evaluated Sophos.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Complaints analysis/investigation at compugana
Real User
Top 5
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
  • "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
  • "We'd like to see better integration with other security tools."

What is our primary use case?

Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.

How has it helped my organization?

Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks. 

We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network. 

With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.

With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.

What is most valuable?

Some of the Check Point Antivirus features that users may find valuable include:

The firewall helps provide protection to block unauthorized access to the network.

Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.

It has a wide range of features that help make this tool one of the best on the market.

What needs improvement?

As with any tool, improvements can be made. Some improvements that would be useful include:

  • An updated user interface to improve it to make it easier to use.
  • Integration with other security tools. We'd like to see better integration with other security tools.
  • They should incorporate artificial intelligence and machine learning 
  • Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.

For how long have I used the solution?

The solution was implemented approximately five years ago.

What do I think about the stability of the solution?

The tool was designed to be highly stable with regular software updates and proactive monitoring.

What do I think about the scalability of the solution?

It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities. 

How are customer service and support?

They must improve support and customer service by improving response times and their SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point. 

How was the initial setup?

The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.

What about the implementation team?

The implementation was done in conjunction with an engineer from the provider and the IT department.

What was our ROI?

It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.

What's my experience with pricing, setup cost, and licensing?

The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.

Which other solutions did I evaluate?

We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:

What other advice do I have?

It is always important to do a cost analysis and check requirements before making a decision.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user