We are focused on preventing malware and trojans with Check Point Antivirus, which helps us protect from viruses and other malicious attacks, although I do not have a specific situation to share.
Network Security Engineer at Binary Global Limited
Security measures protect systems and save time
Pros and Cons
- "Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss."
- "The pricing for Check Point Antivirus is a bit higher compared to other vendors or standalone antivirus options, and my request to the company is to consider reducing the licensing costs."
What is our primary use case?
My main use case for Check Point Antivirus is to use it as an antivirus to protect our computers and systems.
What is most valuable?
Check Point Antivirus offers comprehensive security features, including real-time scanning based on signature-based detections, behavioral analysis, an anti-malware engine, machine learning, and sandboxing, which collectively protect our systems and computers effectively.
I find the most valuable features of Check Point Antivirus to be behavioral analysis and real-time scanning, as they collectively work to protect our systems.
Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss.
What needs improvement?
While I do not have any specific feature-related suggestions for improvement, I think reducing costs and providing as much technical information as possible would help users feel more comfortable installing and configuring the product.
Improvements could involve enhancing support documentation to make the installation and configuration processes easier for users.
For how long have I used the solution?
I have been using Check Point Antivirus for a few months since we started using this antivirus.
Buyer's Guide
Check Point Antivirus
June 2025

Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Deploying Check Point Antivirus in our environment is not so hard. I logged into the management portal, downloaded the client provided by the antivirus, installed it on a few systems manually, and saw all systems on the management control panel.
My experience with the configuration process is quite easy; I did not encounter any significant challenges.
What do I think about the stability of the solution?
As of now, Check Point Antivirus is stable; I have not experienced any crashes or downtime.
What do I think about the scalability of the solution?
We have purchased a limited number of licenses, but Check Point Antivirus can handle growth if our organization expands or adds more devices.
How are customer service and support?
Customer support for Check Point Antivirus is really good; we haven't needed to contact them for technical support, but I found them helpful for licensing issues.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is my first time using Check Point Antivirus.
How was the initial setup?
The initial setup with Check Point Antivirus was easy and straightforward.
What's my experience with pricing, setup cost, and licensing?
The pricing for Check Point Antivirus is a bit higher compared to other vendors or standalone antivirus options, and my request to the company is to consider reducing the licensing costs.
Which other solutions did I evaluate?
We did evaluate other options, specifically Sophos Endpoint Security, before ultimately deciding to choose Check Point Antivirus.
What other advice do I have?
Check Point Antivirus is deployed on-premises in our organization, but we manage it from the cloud using a central platform to oversee all systems.
I work for an IT SI company that deals with various tech products, including servers like Netapp and Nutanix, and firewalls such as Check Point, FortiGate, Sophos, and Cisco, along with using Check Point Antivirus and Sophos Endpoint Security.
I request not to receive calls from representatives; I prefer communication via email.
Check Point Antivirus is a comprehensive antivirus that covers all aspects, including real-time scanning, signature-based detection, behavioral analysis, machine learning, and sandboxing integrations.
I rate Check Point Antivirus a 10 out of 10 because it is a comprehensive antivirus that covers all aspects of security.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Jun 15, 2025
Flag as inappropriate
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Stops viruses from crossing the perimeter firewall to the inside
Pros and Cons
- "The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing."
- "Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails."
What is our primary use case?
The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.
What is most valuable?
The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing. IPS and Antivirus work in conjunction. It doesn't even cross the perimeter firewall to the inside.
What needs improvement?
Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails.
For how long have I used the solution?
We have been using Check Point Antivirus for four years.
What do I think about the stability of the solution?
It's very stable. The only thing is that sometimes the Antivirus Blade fails but then the next time it succeeds. We get some alerts that the Antivirus Blades fail. But it then automatically updates. Antivirus is different from IPS, it's always trying to update and it's automatic.
What do I think about the scalability of the solution?
It scales well. You can use the same profile and the same exceptions on all the firewalls on the management. It's deployed to eight firewalls.
It takes three people to maintain the solution. They are security, engineers, and architects.
How are customer service and technical support?
Technical support is good. We were getting some logs without any information and we couldn't get to a conclusion of what that was. We gave up because it was not a big deal, but it was the only bad experience we had with them. In general, it's good.
Which solution did I use previously and why did I switch?
We also used Fortinet's Antivirus. They are equivalent from one to the other. Even the configuration is similar. There's not a big advantage to one or the other.
How was the initial setup?
The initial setup was very straightforward. If you want to block a virus, for example, the signatures have a medium or higher impact. It's very easy to create the initial profile. It's also very easy to deploy exceptions with the SmartConsole.
We could do the deployment without all of the fine-tuning in one day.
Our implementation strategy was to start with the Blade on detection mode for at least one week, then check the box to see what would be brought in if we were on prevention mode and see if we need to do some exceptions or if there are any false positives. If not, we put it on prevention mode.
What was our ROI?
Our return of investment is to have our infrastructure protected and to see that something is a working virus that would otherwise be able to reach our infrastructure.
What's my experience with pricing, setup cost, and licensing?
Usually, Check Point products are not cheap but compared to Fortinet, it's in line with the competition. There aren't additional fees that I'm aware of.
What other advice do I have?
If you have Check Point firewalls on your infrastructure, this is the best solution to deploy because it's just to enable a Blade. If you don't have Check Point firewalls, you should also consider other solutions. If you already have Check Point firewalls, the traffic is already going through them so it's just a matter of enabling the Blade.
Try to run through the manuals to see the signatures and how to deploy and to create a profile. You can install the SmartConsole and run the demo mode and you can do some simulations without having to deploy a firewall. It's also good that you can do the demo mode and try to create an exception to create a profile.
It's not very hard to have a network antivirus solution which can be very important to protect the network. It should be as important as having the antivirus on the end-user's machine.
I would rate Check Point Antivirus a nine out of ten. Not a ten because of the updates.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Check Point Antivirus
June 2025

Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
RSSI at SDIS49
Provides good security and integrates well with other products
Pros and Cons
- "Check Point integrates well with other security products."
- "The initial setup and configuration should be simplified."
What is our primary use case?
We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.
What is most valuable?
The most valuable feature is security.
Check Point integrates well with other security products.
What needs improvement?
The pricing can be improved.
The interface could be more user-friendly.
The initial setup and configuration should be simplified.
For how long have I used the solution?
We have been using Check Point Antivirus for four years.
What do I think about the stability of the solution?
This is a very stable product.
What do I think about the scalability of the solution?
We have not had the need to scale. We have about 3,000 people who are protected by Check Point, and three of them are administrators.
How are customer service and technical support?
I would say that the technical support is okay. There are two levels; there is our installer, who we have known for several years, and there is the engineer, who we do not have much contact with.
Which solution did I use previously and why did I switch?
We use Windows Defender for our endpoint antivirus solution. For email protection, we use the FireEye Email Security solution. Our Check Point handles our central filtering and we also use some Infinity products. All of these work in combination with each other for our security.
How was the initial setup?
The initial setup is complex. For the complete installation, our deployment took a few days.
What about the implementation team?
We had the help of a Check Point specialist for our deployment.
What other advice do I have?
This is a good product and one that I recommend.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
All-in-one solution that offers the ability for users to have a different interface port per user group
Pros and Cons
- "They have pretty much everything you can ask for as far as features are concerned. That is because they know their market. They are focused on what they do and they do only that."
- "The pricing is really extremely high in comparison to the rest of the market."
What is our primary use case?
The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind.
There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.
What is most valuable?
One of my favorite features is the logging. The log journal is very descriptive in what it records about the traffic. It is a good way of tracking who comes in and who goes out of your network.
What needs improvement?
I think this product is made by the market leaders. They have pretty much everything you can ask for as far as features are concerned. The pricing is high and I think it could be more competitive if it was lower. They might resolve that difference by offering even more features.
Another feature I'd like to see is a different way to handle load balancing on the firewall. Sometimes when you are using a firewall, you need another layer to properly balance your traffic. Right now that means adding more equipment, which is expensive. If Check Point could offer another option for a different way of doing load balancing, that would be a cost-savings for the client.
Another option might be offering data fusion. Sometimes you can combine the data stream. If you can and you do, you will have one stream instead of having multiple streams. That is also very cost-saving when you can fuse the data.
What do I think about the stability of the solution?
The product is stable. I'm quite satisfied with the stability.
How are customer service and technical support?
I think the technical support is very good. They know what they are talking about and I get answers when I need them.
How was the initial setup?
The setup was straightforward. The deployment took me only a couple of hours.
What about the implementation team?
I am both a consultant and at the same time a systems integrator. I do the installations.
What's my experience with pricing, setup cost, and licensing?
The pricing is really extremely high in comparison to the rest of the market. The cost for the licensing of the Check Point 3100 series is a little bit over 10,000 euros. But they also make the software subscription mandatory. That means that not only do you have to buy the appliance, but you have to also buy a subscription.
Which other solutions did I evaluate?
The other firewall solutions that my clients usually want to consider when they are looking for an anti-malware tool aside from Check Point are Fortinet (which is also a good product) and SonicWall (which is also a good product).
As far as how these products compare, I would say Fortinet has more accessibility in terms of just getting the product. Check Point is very hard to procure. You have to go through different channels, you have to follow different requirements and give a lot of private information in order to acquire it. Sometimes there are governmental laws and restrictions that affect the procurement of a product with such sophisticated encryption. It is almost like they have to clamp down on the encryption when the product is outside the US. It is like wifi. When you order wifi access points for the UK or for the US, there are different encryption algorithms. As soon as that product goes out of Europe or the US, it is illegal to keep the same encryption type. You have to lower the level of encryption for some reason. It seems very strange.
When leading countries start dictating what you should have and what you should not have, it seems like there is no justice. It should not be that you consider yourself a privileged country and you want to have a high level of encryption and not allow people in other countries to have it. If you believe in fairness, equality, and sharing — all of these values are things we hear them talking about, but that they don't allow us to experience. In just buying the goods, you have different standards for our country. The same product should be the same thing everywhere. We are on the same grounds and the same sky above you. It is not fair and even trades for everybody, but it costs the same.
What other advice do I have?
Advice that I would give to others who are looking to implement Check Point Antivirus in their organization is the same advice I would give to someone considering any solution. Before you invest any money in any product — it could be Check Point, it could be Fortinet — you have to know what you are trying to achieve. If you don't know what you are trying to achieve, there is no purpose in buying anything. It will not serve a purpose.
First, define your parameters, understand the risk that you are up against without the solution and what the benefits are if you buy. Then after you think about it, it is time to decide if it is worth it according to your actual needs. You do not always need to go to get fancy products and an enterprise solution if the purpose and scope for your plans do not fit the model of those products. Sometimes I hear people just say they want a product because they hear it is the best name. Sometimes a choice like that is more overwhelming. It does not serve the purpose, it is more difficult to deploy and people end up not even using it. The purchase becomes an operating capital that gets burned and spent for no reason when it was money they could have invested somewhere else. They just put the money in the wrong place because they want to do like everyone else. If you are talking about a large insurance corporation, their needs are much different than if you are talking about a small or medium-sized company that does not fall under so many government restrictions.
I would recommend Check Point Antivirus for medium and enterprise-sized organizations. Not for small organizations because it would almost always be too much.
On a scale from one to ten where one is the worst and ten is the best, I would rate Check Point Antivirus as an eight to nine. That is because they know their market. They are focused on what they do and they do only that. Their focus is not spread out so they produce the best product.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Easy to configure and detects many threats and files containing malware
Pros and Cons
- "Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one."
- "The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."
What is our primary use case?
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
How has it helped my organization?
Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one.
What is most valuable?
Check Point is easy to configure, and it detects many threats.
What needs improvement?
The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.
While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.
For how long have I used the solution?
I have been using Check Point Antivirus for ten years.
What do I think about the stability of the solution?
Sometimes, Check Point Antivirus raises connection issues even when the license is valid. Consequently, we encounter difficulties installing the antivirus on various devices. Moreover, the solution isn't always stable. Occasionally, update failures occur without apparent reason, necessitating the need to open a support case.
What do I think about the scalability of the solution?
One thousand users, including the financial, IT, and HR teams, are utilizing this solution, essentially encompassing all departments in their company, as everyone uses the internet. From our experience, it's very resource-intensive and not one of our most scalable features. As I mentioned, sometimes we encounter CPU logs on some firewalls, often related to the antivirus. Therefore, sometimes, we need to turn it off or adjust its settings.
I rate the solution's scalability as seven out of ten.
How are customer service and support?
The solution should have better support from more knowledgeable engineers when opening a case rather than starting with junior engineers and escalating after one or two weeks.
How would you rate customer service and support?
Neutral
How was the initial setup?
Once the security gateway is up and running, you simply navigate to the features section, ensure you have the appropriate license, and enable the antivirus feature. Then, you can select one of the recommended profiles. Once you've chosen the profile, you're all set.
It takes one day to deploy if you have already added the firewall.
I rate the initial setup a nine out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
We have the license for all the other FortiGate, which comes with the IPS and antivirus. However, you need to pay for the antivirus separately. In terms of cost, it is slightly more expensive than Fortinet.
What other advice do I have?
Check Point Antivirus has helped us protect our company's security exposure. It has already detected some files that, if successfully downloaded, could pose a significant problem.
However, it consumes a lot of resources. Enabling antivirus on the Check Point firewall is one of the most resource-intensive processes you can allow, even more so than the IPS.
We requested that antivirus be enabled on three of our firewalls because the CPU usage was consistently 90%. Testing this feature has shown that some improvements in performance should reduce resource consumption.
We enable Check Point's default recommended profile. Preset profiles are already available; we choose one to help without configuring our own.
I would recommend improving the performance to reduce resource consumption and enhance stability.
In terms of security, Check Point Antivirus is practical and improves our company's security posture.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Anti-Malware ToolsPopular Comparisons
Microsoft Defender for Endpoint
ESET Endpoint Protection Platform
Microsoft Exchange Online Protection (EOP)
VirusTotal
Cuckoo Sandbox
ZoneAlarm
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
- Looking for alternatives to Symantec Cloud Protection Engine
- Who provides a better antivirus solution: Bitdefender or Sophos?
- Which antivirus is best for isolated work PCs?
- How do you identify malware?
- Why are Anti-Malware Tools important for companies?