Try our new research platform with insights from 80,000+ expert users
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

Buyer's Guide
Check Point Antivirus
June 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Antivirus
June 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
EmmaRichardson - PeerSpot reviewer
Database Administrator at Hildes Technologies
Real User
Easy to configure with good virus and malware protection
Pros and Cons
  • "The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely."
  • "There could be more additions to the compatible systems and applications for integration purposes."

What is our primary use case?

The primary use case of Check Point Antivirus is to protect our machines and data from viruses and to clean our systems from all malware to ensure the security of our data and servers from external threats and invasions. 

We have configured Check Point antivirus with all our machines, servers, and databases as a security solution against real-time virus threats that may harm our systems. 

It has been easy to configure and provides up-to-date advanced-level protection. Remote management is also being used to remove any potential viruses from users' machines if found. 

How has it helped my organization?

It has improved the overall security of our machines and data with multi-layered antivirus solutions. Real-time threat protection is a wonderful aspect of Check Point Antivirus and can provide 24/7 security to configured machines.

It makes us feel more secure and helps us to react proactively against any online invasion and data protection. The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely. 

What is most valuable?

The most important and useful feature is the regular updates against modern-day viruses. We have seen that new viruses and malware are introduced by hackers every day, and we need to keep ourselves a step ahead for protection against those threats. 

Check Point Antivirus, with its up-to-date features, ensures that we are always ahead of the new versions of viruses and provides real-time protection. The overall features and data loss prevention makes it a valuable product in every way.

What needs improvement?

There could be more additions to the compatible systems and applications for integration purposes. It doesn't cover some of the applications and operating systems like macOS and SAP cloud products. 

Another issue I can recall is the fake threat calls and removal of safe applications (assuming them to be viruses and malware), which is sometimes annoying. The overall product features and functions are reliable and have everything covered otherwise and I consider it to be the best antivirus solution. 

For how long have I used the solution?

I've used the solution for more than two years.

What do I think about the stability of the solution?

We find it to be an almost 99% stable solution.

What do I think about the scalability of the solution?

This is an excellent, scalable solution.

How are customer service and support?

Technical support is very effective and knowledgeable. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What's my experience with pricing, setup cost, and licensing?

This is a good solution that comes at a reasonable price.

Which other solutions did I evaluate?

I did not evaluate other options. 

What other advice do I have?

It is a very effective antivirus and I would recommend it. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET
Real User
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
  • "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."

What is our primary use case?

We use Check Point Antivirus for cyber security purposes.

What is most valuable?

What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.

You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.

What needs improvement?

An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.

For how long have I used the solution?

I've been using Check Point Antivirus for six months.

What do I think about the stability of the solution?

Check Point Antivirus is a stable solution. It's a very good solution.

What do I think about the scalability of the solution?

Check Point Antivirus is a scalable solution.

How are customer service and support?

The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.

On a scale of one to five, my rating for Check Point Antivirus support is four.

How was the initial setup?

Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.

How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.

What about the implementation team?

I implemented Check Point Antivirus myself.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.

Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.

You can't buy a license for the solution without being a Check Point partner first.

What other advice do I have?

I'm using the latest version of Check Point Antivirus.

I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.

Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.

I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.

On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good security features and excellent protection from malware and ransomware
Pros and Cons
  • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
  • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

What is our primary use case?

We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

How has it helped my organization?

The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

What is most valuable?

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

What needs improvement?

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is easy to configure and is not very invasive with users, which makes it very practical to use.

What's my experience with pricing, setup cost, and licensing?

Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Good signature-based protection, great sandbox feature, and offers continuous scanning
Pros and Cons
  • "Regular email alerts are beneficial."
  • "The technical support could be improved."

What is our primary use case?

We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.

We have two security gateway and one security management server which is running R81 gaia OS.

We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.

Check Point Antivirus continuously scans each and every file before reaching the destination.

How has it helped my organization?

Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.

Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.

Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.

What is most valuable?

Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet

The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.

It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.

 Overall, this system performs a superb job of safeguarding us.

What needs improvement?

The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.

The technical support could be improved.

Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.

For how long have I used the solution?

I've used the solution for more than two years.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jhonjerlyn Morales - PeerSpot reviewer
CEO at JL Real Estate
User
Good technical support with constant updating of the EDR and good overall security
Pros and Cons
  • "New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system."
  • "Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices."

What is our primary use case?

Check Point Antivirus is being used with integrations in all our company software and also with connections to all the computers that we use in our work sectors. All areas of our company such as sales, marketing, or finance have Check Point Antivirus implemented. 

This antivirus is capable of monitoring the state of the network and knowing if there is any threat in our business network while being able to clean it up immediately. 

All departments within the company have been kept safe since day one of using Check Point. In order to connect all the computers and monitor them in real-time from the Check Point application, we use an app. From this app, you can see the status of all computers, restore them, and eliminate threats from a single panel.

How has it helped my organization?

Previously, we had trouble detecting data leaks and protecting the services we used in our business. Financial and marketing software services were the main affected areas. 

After the implementation of Check Point, our computers have remained connected to a secure network where threats are prevented from entering thanks to the EDR system, and systems have been restored to a stable state where there are no threats. 

We have kept our files safe and restored them to an original state before being affected by a threat thanks to the system recovery system. 

We are very grateful for the results obtained in recent years. Our computers (the main source of work) have remained secure. Our employees can manage online campaigns and control the flow of clients without fear of being affected by any threat; it has a system of anti-malware and anti-phishing to detect threats in time.

What is most valuable?

The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats. 

This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats. 

New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.

Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.

What needs improvement?

One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time. 

It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.

For how long have I used the solution?

We have been using this solution for about two years. We did not expect such precise and potential results and our security service has been maintained in the long term thanks to this general security on all types of devices.

What do I think about the stability of the solution?

It turned out to be an antivirus that exceeded my expectations in the long run. 

During the use that we have had in these last two years, our computers have remained protected 24 hours a day and seven days a week. On some occasions, threats have entered our computers, however, the system restore system has counteracted this without any problem. 

It has been a stable antivirus, without any real problems.

What do I think about the scalability of the solution?

The process of scaling, implementation and use went quite well; it took approximately two software engineers and three cyber security experts to successfully implement the service. They were in charge of configuring the real-time monitoring system for computers and updating the status of viruses.

How are customer service and support?

Customer service was satisfactory. 

During our implementation process, several questions arose about how the data leak detection system should be configured. All of these questions were answered immediately in a live chat with the Check Point team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I used the Microsoft service, however, it was not able to protect all the threats trying to get into our business computers. 

One of the main reasons why I stopped using the Microsoft Antivirus service, is due to the fact that it was consuming a lot of resources on the computers while it was running and while the EDR database was being updated. This directly affects the experience of our employees on the computer and limited them at work. Since we implemented the Check Point service, the consumption of resources decreased on a large scale and we managed to obtain better analysis and virus detection.

How was the initial setup?

Setting up the system was somewhat complicated, requiring several of our engineers and cyber experts to successfully implement the antivirus service. 

The initial implementation took approximately one week to set up all the company's computers and synchronize them on the same protected network.

What about the implementation team?

The implementation was done with an internal team in our company; there was no involvement of a vendor team.

What was our ROI?

Our return on investment has been the protection of the entire work structure, our administrative processes have been protected by this great EDR system, and all the devices used in our company are monitored by a system that is responsible for eliminating threats before they react. 

We are happy with the money spent on this great security software; our computers have been more protected.

What's my experience with pricing, setup cost, and licensing?

I would recommend that you have a good amount of capital to access a considerably good protection plan from Check Point. 

Currently, the prices for installation and configuration are a bit high, and small or medium-sized companies could not afford these prices. 

You need a trained team to implement the Antivirus system as quickly as possible since it is a bit difficult to configure.

What other advice do I have?

In a solution that is undoubtedly worthwhile, it has a perfect methodology for finding viruses before they react to the computer's files. 

It has a very good interface, is easy to handle, and protects all kinds of services that are being used.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good scanning capabilities, excellent network security, and easy to configure
Pros and Cons
  • "It can scan the files that our users have downloaded to check if they have a virus."
  • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

What is our primary use case?

Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

How has it helped my organization?

It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

What is most valuable?

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

What needs improvement?

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

For how long have I used the solution?

Check Point Antivirus was implemented 4 years ago.

What do I think about the stability of the solution?

It is a very stable product. However, we've had some problems with the updates.

What do I think about the scalability of the solution?

It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

How are customer service and support?

The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Check Point as our first option.

How was the initial setup?

The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

What about the implementation team?

The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

What was our ROI?

Our ROI is that we keep all our network and equipment safe and updated.

What's my experience with pricing, setup cost, and licensing?

I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

Which other solutions did I evaluate?

As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

What other advice do I have?

Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.