Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Information Security Analyst at a non-profit with 1,001-5,000 employees
Real User
Multiple virtual firewalls on one box are extremely useful
Pros and Cons
  • "Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour."
  • "The multiple virtual firewalls on one box are extremely useful and the interconnection with virtual switches is simple and easy to understand."
  • "We have Microsoft CASB cloud app security and it's one of the least compatible firewalls. They really need to look at this, as both Check Point and Microsoft are major players. Why aren't they compatible? If we had Palo Alto then we wouldn't have this problem."

How has it helped my organization?

Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour.

What is most valuable?

The multiple virtual firewalls on one box are extremely useful and the interconnection with virtual switches is simple and easy to understand.

We need a product that is logical and for which we can find people skilled who are interested in learning it. Check Point is always a winner, as its an industry standard.

What needs improvement?

We have Microsoft CASB cloud app security and it's one of the least compatible firewalls. They really need to look at this, as both Check Point and Microsoft are major players. Why aren't they compatible? If we had Palo Alto then we wouldn't have this problem.

For how long have I used the solution?

Three to five years.

Buyer's Guide
Check Point CloudGuard Network Security
June 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,168 professionals have used our research since 2012.

What do I think about the stability of the solution?

No stability issues, not even once. The firewall is set up and and the various parts are interconnected. It works just fine. R80.1 is also a major improvement.

What do I think about the scalability of the solution?

No scalability issues but I don't think we are utilizing the device to its maximum capability.

How are customer service and support?

Good. We go with a distributor but they work okay. It is a lot more reliable with the latest OS than it used to be.

Which solution did I use previously and why did I switch?

No previous solution. It's always been Check Point, though before the virtual firewall we used to have a Juniper fw. Now we are just Check Point because for the threats we face now, I don't think we need different firewalls at different layers.

How was the initial setup?

The issue normally is getting SIC working between the gws and the management server. Actually it's reasonably straightforward, though you have to get it right. It used to be you had to have a certain type of disk drive but this is a better solution.

What's my experience with pricing, setup cost, and licensing?

Look into this carefully and be sure you use all you buy. We haven't bought SandBlast or the bot solution but they look effective.

Which other solutions did I evaluate?

We did not evaluate other solutions. It was decided we would stay with Check Point.

What other advice do I have?

Make sure you can make use of the virtual firewalls and read up on the device or take a course before you implement. Or, if you get it installed, make sure you have the right devices in the right virtual firewalls.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Co-founder & CTO at a tech services company with 11-50 employees
Real User
Valuable features include centralized management using the MDM solution and the log management module.

What is most valuable?

Valuable features include centralized management using the MDM solution of Check Point and the Log Management module. The latest version of VSX supports all blades of Check Point's security suite.

I get maximum flexibility as I can use a standard management server to manage all virtual gateways along with a dedicated log server for each virtual gateway. Sometimes I can use a single server to manage all virtual gateways.

How has it helped my organization?

Earlier versions only supported the Firewall and VPN feature. Now I can run Anti-Bot/Anti-Virus, URL and App Filtering, Threat Emulation, and other blades.

I can assign weights to each virtual gateway depending on how critical each virtual gateway is.

The VSLS feature provides linear scalability so I can keep adding hardware (maximum of eight) to meet my performance expectations.

What needs improvement?

It is somewhat difficult to upgrade the entire hardware without downtime.

For how long have I used the solution?

We have been implementing this solution to many customers in India and the SAARC region for seven years now. This is one of the most popular virtual firewall products in the industry.

What do I think about the stability of the solution?

We have not encountered any problems with stability.

What do I think about the scalability of the solution?

A sufficient amount of planning is required to deploy a solution that is scalable. However, as Check Point allows an Open Server to deploy its VSX solution, scalability is not a problem once the base hardware is chosen appropriately.

How are customer service and technical support?

Support is one area where efforts should be required from Check Point. Customers having multiple, more than ten, gateways are encouraged to consider Diamond Support services.

Which solution did I use previously and why did I switch?

We did not use any other solution previously.

How was the initial setup?

Engineers having less than three years of hands-on experience on Check Point products may find this product somewhat challenging. However, the best part is, once the product is deployed, there is no difference between virtual gateway and physical gateway from the operational perspective.

What's my experience with pricing, setup cost, and licensing?

Check Point pioneered this product, so don't look anywhere else if you are looking for a stable and scalable product with top-notch security blades.

Which other solutions did I evaluate?

We did not evaluate any alternative products.

What other advice do I have?

Choose your implementation partner very carefully. Choose someone who has done multiple, large-scale implementations and can show proof of the same in terms of customer references through emails or phone calls.

Disclosure: My company has a business relationship with this vendor other than being a customer. We are a value added partner of Check Point in India.
PeerSpot user
Buyer's Guide
Check Point CloudGuard Network Security
June 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,168 professionals have used our research since 2012.
Senior Security Engineer at a financial services firm with 1,001-5,000 employees
Real User
The product is stable but we had issues when we had really old hardware that had a less than stable OS.

What is most valuable?

The ability to host multiple virtual systems, categorize them based on their function and importance and the ease of use with which these can be deployed.

How has it helped my organization?

We do not need to keep provisioning hardware each time there is a requirement for a new firewall. Having a physical server capable of hosting many virtuals and also provide performance and redundancy is a big benefit and hence our preference for VSX.

What needs improvement?

Each new version does offer a new set of features plus also incorporates bug fixes identified during the life cycle of the previous product. Hence, this product keeps on maturing as newer versions are released.

For how long have I used the solution?

More than 15 years.

What was my experience with deployment of the solution?

Not from a product point of view. The critical aspect here is proper planning, performing several dry runs and identifying potential issues to the best possible extent. It's really about planning and testing prior to implementing.

What do I think about the stability of the solution?

No, because we keep on top of our installations. We maintain them by performing routine maintenance, and hot-fix applications. Stability wise the product is stable but we had issues when we had really old hardware that had a less than stable OS.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

Excellent – the vendor always supports us and is very proactive. We have excellent relations with the vendor.

Technical Support:

Definitely excellent. It’s a pleasure to talk with the tech support people and know they fully understand the issues – this gives us a sense of comfort.

Which solution did I use previously and why did I switch?

No previous solution used.

How was the initial setup?

It was simple. That is because the solution is architectured and designed from the ground up and the relevant teams were involved from the beginning.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

Cannot give exact figures but we have made a lot of saving by implementing this product in our organization.

Which other solutions did I evaluate?

We were clear on our options – no we did not choose any other options save for the most important ones.

What other advice do I have?

Think of VSX as similar to VMware ESX solution. It will, in the long run, save a lot of money with the return it gives to the company. It is easy to maintain by a capable support team and can easily fit within the network where there is a requirement.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user249372 - PeerSpot reviewer
it_user249372Senior Security Consultant with 501-1,000 employees
Real User

We have found VSX solutions to have lot of issues in our customers networks... Also hard troubleshooting and some anomalies are common. More than one customer feel safer with phisical Check Point appliances rather than VSX and decided to roll-back after some time of use (12 months of production). I can't raccomend this product, if you're looking to firewall instance virtualization, look further and you can find more mature solutions.

PeerSpot user
Senior InfoSec Engineer at a tech services company with 10,001+ employees
Consultant
Very intuitive ACL menu and design. A powerhouse firewall appliacnce

Valuable Features:

Easy to setup and use as its based off Redhat Intuitive ACL menu for writing rules Pre-populated common ports Customizable ports Suite of tools to report and troubleshoot network conditions

Room for Improvement:

At the beginning the design can be overwhelming, where to start Getting used to the CLI syntax but do-able

Other Advice:

This enterprise class firewall appliance is great and very intuitive menu. Great for inline firewall access control to work with Cisco or any vendor switch. It has a suite of applications to help you setup virtual firewalls and provide redundancy or bandwidth to whatever application or service you are providing.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Manager of Infrastructure with 51-200 employees
Vendor
It has improved the way our organization functions in terms of visualization, simplicity, manageability, and support.

Valuable Features

Most of all, depends upon your environment.

Improvements to My Organization

It has improved the way our organization functions in terms of visualization, simplicity, manageability, and support.

Room for Improvement

Areas for improvement include other Security Features like AntiVirus, AntiSpam, DLP etc.

Use of Solution

I have been using this solution for a decade.

Deployment Issues

No issues with deployment.

Stability Issues

No issues with stability but it completely depends on how you/ at what stage you implement. Additionally, what features you enable.

Scalability Issues

No. You need to look upon sizing, one should never oversize nor undersize. Detail understanding is a requirement one needs to keep in mind.

Customer Service and Technical Support

Customer Service: Good customer service.Technical Support: Good technical support.

Initial Setup

The initial setup was normal.

Implementation Team

Vendor, but internal team should be aware of the technology.

ROI

Recently we have upgraded to new model, now looking into 3yrs cost, this is the first year. So cant say much.

Other Solutions Considered

Yes, we evaluated Cisco.

Other Advice

Only advice I can give is that whatever product you select, it's important to keep in mind your Requirements, Budget, and POC.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Allows filtering of servers on AWS for Internet access and significantly reduced the risk of unauthorized access
Pros and Cons
  • "Now, we can filter which websites users can access and block categories that are a risk. For example, we can block social media and gambling sites. This has helped to decrease the risk of access to malicious content on the internet."
  • "The complexity to deploy should be decreased."

What is our primary use case?

We use it to protect Internet access from our AWS environment.

How has it helped my organization?

Before we implemented CloudGuard, we had no filtering on what was accessed on the internet from our AWS environment. 

Now, we can filter which websites users can access and block categories that are a risk. For example, we can block social media and gambling sites. This has helped to decrease the risk of access to malicious content on the internet.

What is most valuable?

It allows us to filter what the servers on AWS can access on the Internet and allows us to filter in terms of IPS, antivirus, and so on, for the contents that are accessed on the Internet.

What needs improvement?

The complexity to deploy should be decreased. 

For how long have I used the solution?

I have been using this solution for about five years. 

What do I think about the stability of the solution?

It is a stable solution. It has been pretty stable for us. We haven't faced any problems since it rolled out. 

I would rate the stability a nine out of ten.

What do I think about the scalability of the solution?

I would rate the scalability a nine out of ten. We have around 200 end users using this solution in our company. 

How are customer service and support?

The customer service and support from the vendor take a lot of time. 

The first line of support is not very good. They usually start with junior engineers when you open a case, which can be time-consuming.

How would you rate customer service and support?

Neutral

How was the initial setup?

I would rate my experience with the initial setup an eight out of ten, where one is easy and ten is difficult to setup. 

What about the implementation team?

For the deployment, we work with the vendor. So, the deployment took two weeks.

We need to provision the firewall, deploy the manager, and understand where the firewall needs to connect, which AWS area, and so on.

We just needed more than two people for the deployment. We worked with the security network security architect and called them engineers.

What's my experience with pricing, setup cost, and licensing?

With ten being very expensive, I would rate the pricing an eight out of ten. 

It is expensive.

What other advice do I have?

It's worth it in the sense that it can protect your network, and it's very scalable.

Overall, I would rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1203795 - PeerSpot reviewer
Business Manager at a tech services company with 11-50 employees
Real User
A user-friendly and compatible cloud security solution
Pros and Cons
  • "I like the firewall and the virtual machine. I also like that it's compatible with Amazon Web Services and Azure."
  • "Check Point Virtual Systems is a complete solution, but pricing can be better."

What is most valuable?

I like the firewall and the virtual machine. I also like that it's compatible with Amazon Web Services and Azure.

What needs improvement?

Check Point Virtual Systems is a complete solution, but pricing can be better.

For how long have I used the solution?

I have been using Check Point Virtual Systems for about five years.

What do I think about the stability of the solution?

It's very stable. 

What do I think about the scalability of the solution?

Check Point Virtual Systems is very scalable. 

How are customer service and technical support?

We depend on the community a lot. It's good. The response time from technical support is also good.

How was the initial setup?

The initial setup was complex. It took about four months to implement this solution. Four people deploy and maintain this product.

What's my experience with pricing, setup cost, and licensing?

The price could be better.

Which other solutions did I evaluate?

We evaluated two or three competing products like Huawei. Check Point and Fortinet is quality, but the prices vary. Huawei is very easy to use, and it's common. The main difference between all is the cost.

What other advice do I have?

I would recommend Check Point as it's an effective tool, and implementation is very easy.

On a scale from one to ten, I would give Check Point Virtual Systems a nine.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer2350698 - PeerSpot reviewer
Sysadmin at a computer software company with 51-200 employees
Real User
Top 20
Helps to inspect internet traffic
Pros and Cons
  • "The tool's most valuable features are inspecting internet traffic and IPS. We can manage the firewall using shared policies from a single management server."
  • "The challenge mainly revolves around the slower functionality of virtual IP switching in Azure Virtual Network compared to on-premise solutions. On-premise, switching between clusters is faster, taking only a few seconds, while in Azure, it can extend up to five minutes. The downtime is a concern for us."

What is most valuable?

The tool's most valuable features are inspecting internet traffic and IPS. We can manage the firewall using shared policies from a single management server. 

What needs improvement?

The challenge mainly revolves around the slower functionality of virtual IP switching in Azure Virtual Network compared to on-premise solutions. On-premise, switching between clusters is faster, taking only a few seconds, while in Azure, it can extend up to five minutes. The downtime is a concern for us. 

What do I think about the stability of the solution?

CloudGuard Network Security's stability is good. 

How are customer service and support?

Overall, my experience with Check Point support has been positive. There were instances where basic questions were asked, even though I had already provided the information in the ticket. One ticket took two years to resolve. 

How would you rate customer service and support?

Positive

How was the initial setup?

The tool's deployment is more complicated than an on-prem setup. Setting up and managing CloudGuard Network Security in Azure presents some challenges. There are complexities in handling downtime in on-premise and cloud firewalls. Additionally, difficulties arise in deploying a new cluster for an upgrade, as the in-place upgrade might not function as expected.

The process of exchanging virtual machines in Check Point is currently complex. You cannot simply deploy a new machine and use it; instead, you need to navigate through several steps. This involves associating the new machine with a network group, entering various details, and sometimes providing the entire path to locate the object in the cloud.

What other advice do I have?

The tool is working well so far for normal use cases. I rate it an eight out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.