My main use case for Check Point Infinity involves using the Check Point 18000, which is a Quantum Spark, as a firewall to block unauthorized access to my organization's network. I use this as a firewall which I can credit for blocking unauthorized access from coming inside. Check Point is very useful to me for blocking each and every device with unauthorized access coming to the inside network. The best thing about Check Point is its feasibility to show what kinds of devices have been connected, whether it is a mobile phone, laptop, desktop, or smartwatch. Each category shows in one dashboard, displaying the number of connected devices, making it easy for me to block unauthorized mobile phones or smartwatches while allowing only official use for laptops and desktops.
I am performing these tasks on a day-to-day basis, and I even refer this solution to everyone as well.
These features of Check Point Infinity help me stop real security issues effectively. It has stopped a lot of potential threats for me because, with my previous firewall, which I don't want to disclose, I didn't have the same feasibility to see each device categorized easily. Whenever a device gets infected, Check Point Infinity immediately alerts me with a pop-up simply showing the IP address. From there, I can quickly identify whether the device is a mobile, computer, laptop, or smartwatch to block it efficiently, thus keeping my internal network safe and secure.
The best features that Check Point Infinity offers are its ease of configuration and smooth user experience. I find it very useful because I completed the configuration within two days, despite thinking it would be complicated compared to my previous firewall. I considered restoring my previous firewall backup, but since it was a different brand, I decided to start from scratch. I thought configuring each user's laptop and applying patches would be difficult, but Check Point Infinity made it simple, allowing me to quickly set up local and remote VPNs. Identifying glitches and options is easy, unlike other firewalls, making Check Point Infinity very user-friendly.
There is a reporting alert feature that I find useful in Check Point Infinity. Whenever there are any glitches, such as DOS or DNS activities from internal sources, Check Point Infinity easily identifies those issues and quickly alerts me as the admin through pop-ups, email, and text messages. I can log into Check Point Infinity and block the device immediately when alerted.
Check Point Infinity has positively impacted my organization by significantly reducing incidents. It has defended us against numerous threats and malware, providing immediate alerts when a device is infected. Whenever a threat is identified, I receive a pop-up notification stating that specific devices are infected, and affected IPs automatically get thrown onto the block list for easy identification and actionable responses.
I estimate that since starting with Check Point Infinity, I have received over a hundred alerts for threat protections and malware incidents. Whenever these alerts come through, I block the particular IP, ensuring my internet and network stay safe and secure.
I have seen a return on investment with Check Point Infinity as it prevents costly incidents effectively. The device identifies any impending threat and alerts me immediately, allowing me to log in to the GUI and take necessary actions quickly. This process saves a lot of time and reduces the number of incidents we experience, proving to be invaluable for a system admin.