What is our primary use case?
Check Point Antivirus is being used with integrations in all our company software and also with connections to all the computers that we use in our work sectors. All areas of our company such as sales, marketing, or finance have Check Point Antivirus implemented.
This antivirus is capable of monitoring the state of the network and knowing if there is any threat in our business network while being able to clean it up immediately.
All departments within the company have been kept safe since day one of using Check Point. In order to connect all the computers and monitor them in real-time from the Check Point application, we use an app. From this app, you can see the status of all computers, restore them, and eliminate threats from a single panel.
How has it helped my organization?
Previously, we had trouble detecting data leaks and protecting the services we used in our business. Financial and marketing software services were the main affected areas.
After the implementation of Check Point, our computers have remained connected to a secure network where threats are prevented from entering thanks to the EDR system, and systems have been restored to a stable state where there are no threats.
We have kept our files safe and restored them to an original state before being affected by a threat thanks to the system recovery system.
We are very grateful for the results obtained in recent years. Our computers (the main source of work) have remained secure. Our employees can manage online campaigns and control the flow of clients without fear of being affected by any threat; it has a system of anti-malware and anti-phishing to detect threats in time.
What is most valuable?
The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats.
This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats.
New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.
Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.
What needs improvement?
One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time.
It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.
For how long have I used the solution?
We have been using this solution for about two years. We did not expect such precise and potential results and our security service has been maintained in the long term thanks to this general security on all types of devices.
What do I think about the stability of the solution?
It turned out to be an antivirus that exceeded my expectations in the long run.
During the use that we have had in these last two years, our computers have remained protected 24 hours a day and seven days a week. On some occasions, threats have entered our computers, however, the system restore system has counteracted this without any problem.
It has been a stable antivirus, without any real problems.
What do I think about the scalability of the solution?
The process of scaling, implementation and use went quite well; it took approximately two software engineers and three cyber security experts to successfully implement the service. They were in charge of configuring the real-time monitoring system for computers and updating the status of viruses.
How are customer service and support?
Customer service was satisfactory.
During our implementation process, several questions arose about how the data leak detection system should be configured. All of these questions were answered immediately in a live chat with the Check Point team.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously, I used the Microsoft service, however, it was not able to protect all the threats trying to get into our business computers.
One of the main reasons why I stopped using the Microsoft Antivirus service, is due to the fact that it was consuming a lot of resources on the computers while it was running and while the EDR database was being updated. This directly affects the experience of our employees on the computer and limited them at work. Since we implemented the Check Point service, the consumption of resources decreased on a large scale and we managed to obtain better analysis and virus detection.
How was the initial setup?
Setting up the system was somewhat complicated, requiring several of our engineers and cyber experts to successfully implement the antivirus service.
The initial implementation took approximately one week to set up all the company's computers and synchronize them on the same protected network.
What about the implementation team?
The implementation was done with an internal team in our company; there was no involvement of a vendor team.
What was our ROI?
Our return on investment has been the protection of the entire work structure, our administrative processes have been protected by this great EDR system, and all the devices used in our company are monitored by a system that is responsible for eliminating threats before they react.
We are happy with the money spent on this great security software; our computers have been more protected.
What's my experience with pricing, setup cost, and licensing?
I would recommend that you have a good amount of capital to access a considerably good protection plan from Check Point.
Currently, the prices for installation and configuration are a bit high, and small or medium-sized companies could not afford these prices.
You need a trained team to implement the Antivirus system as quickly as possible since it is a bit difficult to configure.
What other advice do I have?
In a solution that is undoubtedly worthwhile, it has a perfect methodology for finding viruses before they react to the computer's files.
It has a very good interface, is easy to handle, and protects all kinds of services that are being used.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.