I use it on a perimeter with the internet-facing services, so the traffic will pass through Check Point IPS, which will secure connectivity and communication.
Security Operations Manager at Network International
Offers great features like tunneling, hashing, and SSL
Pros and Cons
- "The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through."
- "The area with certain shortcomings where improvements are required consist of support availability."
What is our primary use case?
What is most valuable?
The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through. The hashing and SSL are also some of the valuable features of the solution.
What needs improvement?
The area with certain shortcomings where improvements are required consist of support availability. The tool's complete operating system architecture is being designed in such a way that it looks a little complicated compared to the tool offered by its competitors. The tool's complete operating system architecture needs to be simplified for the users, especially from an administrative and troubleshooting perspective, so that it can be used quickly or with speed whenever there is a crisis. If the aforementioned areas are considered, the product will be much stronger. The tool's support is a major issue because it has not been quick in certain areas compared to the ones offered by Check Point's competitors.
The product's scalability has certain shortcomings where improvements are required. The product should be able to handle and compete with competitors and their services as well as updates, which are much faster than Check Point.
For how long have I used the solution?
Check Point IPS has been used in my organization for two decades. My company has a partnership with Check Point. My company also has customers at Check Point. My company can be described as a direct consumer, and we even deal with Check Point directly.
Buyer's Guide
Check Point IPS
June 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a seven out of ten.
How are customer service and support?
I rate the technical support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Mainly, in my company's branches, I have Check Point. For my core data center, I use Cisco and some other solutions. Palo Alto is also a product I use in my company. The aforementioned area consists of the IPS tools I use internally in my organization.
How was the initial setup?
The product's initial setup phase was okay.
What was our ROI?
In terms of ROI, I would say that Check Point IPS is able to meet the purpose for which my company purchased it. I rate the product's ROI a nine out of ten.
What's my experience with pricing, setup cost, and licensing?
I rate the product price an eight on a scale of one to ten, where one means it is very cheap and ten means it is very expensive. The product is expensive.
What other advice do I have?
A few integrations with Check Point IPS are a bit complicated, especially the cloud-based ones. The product's integration part is complicated because its users need a lot of support and HA so that it can work in a high-level architecture while also being integrated mainly with cloud platforms and considered a reliable source.
If I speak about objects in Check Point IPS, specifically in terms of the screening, sometimes it will go into the deepest screening which one may not be able to see the logs and for that we need to enable search specific logs, and it needs to be validated. For the aforementioned process, it should be simplified, and similar to other products. There should not be areas that are invisible and it should be transparent.
I rate the tool an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Student at a university with 5,001-10,000 employees
Effortless configuration with deep packet visibility across layers
Pros and Cons
- "Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations."
- "From the product perspective, there have been instances where the signature download caused issues."
What is our primary use case?
Initially, the requirement was just to have a stateful inspection firewall to control traffic entering our network. Later, we needed deep packet inspection to look into packets deeply to identify any kind of malicious content. This led us to start using Check Point IPS to have visibility across all the seven layers of traffic entering the network.
How has it helped my organization?
The solution is consumed by our SOC to ensure we have visibility into traffic entering our network. With IPS's logs, we began to get a lot of visibility into the type of traffic flowing into our network. It fulfills our SOC's need and has become our standard for deep packet inspection, which is easy to deploy.
What is most valuable?
Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations.
What needs improvement?
From the product perspective, there have been instances where the signature download caused issues. However, it happened only once, and some QA is needed on signatures. Overall, the product is robust.
For how long have I used the solution?
I have had experience with Check Point IPS for ten years now.
What do I think about the stability of the solution?
The stability of the solution is excellent. There haven't been any issues after enabling certain features, and it hasn't caused outages in traffic. During certification, we considered exceptions to avoid IPS inspection for legit traffic.
What do I think about the scalability of the solution?
Scalability depends on hardware platform certification. Check Point's Maestro solution allows up to thirty-four firewalls in a load-sharing configuration. Properly sizing the appliance for IPS makes it a scalable solution.
How are customer service and support?
Customer service is a significant drawback. Support is challenging during weekends, and support personnel often require unnecessary details, slowing resolution processes.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We use both Check Point and Palo Alto. Palo Alto is more expensive, with a front-end focused design lacking on the CLI. Check Point provides flexibility with Linux commands, reducing deployment hassle.
How was the initial setup?
Setup is straightforward, rated as ten on a scale of one to ten. Configuration involves enabling the IPS feature and publishing changes, identical to setting up a firewall.
What about the implementation team?
Three engineering team members worked on solution certification. The operations team, supported by four to five people, ensured deployment across global firewalls during limited change windows.
What was our ROI?
The solution fulfills the SOC's need for visibility and easy deployment of deep packet inspection, with no operational impact reported.
What's my experience with pricing, setup cost, and licensing?
As a global customer, we receive decent discounts and expand our infrastructure using the solution. There have been no pricing issues.
Which other solutions did I evaluate?
We also evaluated Palo Alto and previously worked with Juniper long ago. Palo Alto has a steeper learning curve with proprietary terms not aligned with industry standards. Check Point follows standard conventions, simplifying deployment.
What other advice do I have?
Check Point IPS is a preferable solution for its price, stability, and deployment ease compared to more complex solutions.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 20, 2024
Flag as inappropriateBuyer's Guide
Check Point IPS
June 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
ICT Security Consultant at National Treasury of the Republic of South Africa
Robust network security with comprehensive protection, and continuous improvement, offering advanced features like signature-based detection, behavioral analysis, and mobile solutions
Pros and Cons
- "It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention."
- "Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS."
What is our primary use case?
The primary use cases include application security control, comprehensive security management, and proactive protection against a wide range of threats. It serves as a crucial component for safeguarding applications and ensuring overall security effectiveness. It contributes to proactive protection and plays a pivotal role in firewall protection strategies.
How has it helped my organization?
The focus is on safeguarding the departmental environment, and it is effectively fulfilling its role in environmental protection.
What is most valuable?
It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention.
What needs improvement?
Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS.
For how long have I used the solution?
I have been working with it for ten years.
What do I think about the stability of the solution?
It offers excellent stability. I would rate it ten out of ten.
What do I think about the scalability of the solution?
I would rate its scalability abilities nine out of ten. Currently, 1,800 users within our organization actively use it.
How are customer service and support?
I would rate its customer service and support nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be somewhat intricate, involving coordination with the OEM and service provider. I would rate it a six out of ten.
What about the implementation team?
For the deployment, we conducted a refresh last year, which took approximately two to three weeks to complete. It is essential to have at least two individuals involved in the process, with one requiring additional expertise. This team typically consists of a Check Point specialist, an expert, and an administrator.
What's my experience with pricing, setup cost, and licensing?
The pricing is quite reasonable.
What other advice do I have?
It is highly efficient and it provides a mobile solution for various devices, including cell phones and iPads, catering to mobile workflows. The system is not only efficient but continually improving. I would certainly recommend it. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber SOC Manager at Tower Research Capital
A complete solution for intrusion prevention and identify the traffic behavior but lacks scalability
What is our primary use case?
We use the Check Point IPS for intrusion prevention. It was installed inline. This solution enabled us to stop all threats and intrusion activities across the data center. The IPS uses a signature-based approach to control traffic, allowing only authorized traffic to flow outside. However, it can also identify the traffic behavior and enforce the policy based on that behavior, protecting against even new and unknown threats.
What is most valuable?
The docking of the IPS engine can be improved.
For how long have I used the solution?
I have been using Check Point IPS for three years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability an eight out of ten.
What do I think about the scalability of the solution?
I rate the solution’s scalability a five or six out of ten.
How are customer service and support?
Technical support is awesome.
Which solution did I use previously and why did I switch?
I’ve used Cisco. It is very hard to configure and manage the day-to-day operation. It was entirely controlled by the CLI, like the command line interface. Compared to Check Point, it was wholly managed using the GUI. We can finetune and customize the signature. This feature is available in the Check Point.
How was the initial setup?
The initial setup is not so difficult. It takes two and a half months to complete.
I rate the initial setup a six out of ten, where one is difficult, and ten is easy.
What other advice do I have?
I recommend using the out-of-path installation of this tool. Then, find the desired signature and fine-tune the exception based on your specific environment, including the port involved. Once done, bring the tool line into the traffic. Finally, enable the signatures one by one instead of relying on a single group containing older signatures.
The solution has the inherent complexity of managing IT infrastructure and configuring Check Point IPS. The Signature Management requires manual customization to adapt to your network traffic conditions. Building and customizing signatures is a complex and demanding task.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT security and network analyst at Revenu Québec
Efficiently protects workstation, but some lacks automation features
Pros and Cons
- "It is easy to configure."
- "It requires a lot of people to maintain the solution."
What is our primary use case?
Our primary use case is to protect the workstation. The IPS blade is integrated into our Check Point environment. We have many blades in Check Point IPS representation, each with a specific function.
What is most valuable?
The most valuable feature is very good and easy to use. Configuration is straightforward, and support is fast, usually within one hour. The IPS blade is integrated into our Check Point environment and is used for intrusion prevention.
What needs improvement?
There is room for improvement in the pricing model, and it can be more competitive.
Moreover, another area of improvement is in the maintenance of the solution because it requires a lot of people to maintain the solution. Some tasks can be automated, and I would like to see a feature where we can automate the tasks.
For how long have I used the solution?
The company has been using Check Point for around 20 years, and I have been with the company for two years. The IPS blade is integrated with Check Point, and we use R81.20.
How was the initial setup?
The initial setup is straightforward. It is easy to configure.
What about the implementation team?
The solution requires proper maintenance because there are several tasks to check for updates and more. We have five people on the maintenance team. Our company has many firewalls since it is big, and the number of endpoints is more than 5000. Moreover, we have various roles like engineers, system administrators, or network administrators.
What other advice do I have?
I would give Check Point IPS a seven out of ten. We started using this product a year ago, and it has worked well for us.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Operations Manager at a computer software company with 51-200 employees
Great for detection and access with the capabilities of defining specific rules
Pros and Cons
- "We are able to define our own rules for detection."
- "Support is the biggest area for improvement."
What is our primary use case?
We wanted a more robust solution for controlling access to our cloud environments (AWS and Azure). In addition, we wanted our control to be cloud-based.
Our thought was to find a solution to aid us in being proactive as well as reactive. We have multiple environments in multiple clouds with some areas having delegated administration. The solution we needed was one to reduce the need for administrative headcount to continuously review any misconfiguration. Beyond that we were looking to find a solution for SASE.
How has it helped my organization?
The product has allowed us to proactively mitigate any network access misconfiguration resulting from delegation.
We didn't have to hire an additional network administration resource to focus on detecting any misconfigurations. Dome 9 has assisted through the pre-canned compliance templates.
We are able to define our own rules for detection.
In addition to the Harmony Connect Endpoint bundled VPN, the Harmony Connect SASE is continuing to reduce reliance on traditional VPN to the point we will likely discontinue the use of the bundled VPN.
What is most valuable?
In terms of valuable features, it's hard to choose one. Dome9 and Harmony Connect have both been great in detecting and solving access issues.
As mentioned elsewhere in this review, the Harmony Connect SASE has been extremely valuable in improving our security posture and moving us to a zero-trust mindset (organizationally speaking).
Also, as mentioned, Dome9 has paid for itself through the cost savings of additional headcount. If we didn't have Dome 9, we would keep an additional headcount for the single purpose of detecting network changes within the environment.
What needs improvement?
Support is the biggest area for improvement. Check Point is responsive, however, their support agents seem to be very siloed in their ability and/or product knowledge. It takes time and escalation to get through most tickets as they are passed from one group to another and then back again. We are able to navigate our support issues with the aid of our account team, so I want to underscore that support is indeed responsive. However, the processes support techs have to follow seem to be the root cause of the support response issues.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This is where Check Point needs to get operations ironed out. Stable Check Point products are items that haven't been acquired recently. Recent acquisitions seem to lack cohesive functionality.
What do I think about the scalability of the solution?
From what we've encountered, scalability isn't an issue.
How are customer service and support?
Support seems siloed in knowledge, As a result, most support requests require additional management.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used a different solution, however, it was costly and didn't provide the same functionality.
How was the initial setup?
The setup was difficult given the number of products and the lack of a cohesive user experience.
What about the implementation team?
We implemented the product in-house with the aid of support as part of a POC.
What was our ROI?
We noted ROI after one year.
What's my experience with pricing, setup cost, and licensing?
It seems, as with other services of this nature, opting-in on the bundled licensing is the best bet. I'd suggest looking at the Infinity Plan.
Which other solutions did I evaluate?
We evaluated Cisco, Juniper, and Palo Alto.
What other advice do I have?
Make sure you have a good vibe from your sales team. They tend to support you in the long run.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Telecommunication Team Leader at a financial services firm with 201-500 employees
Provides new versions of IPS policies and indicators of compromise, which help us maintain an up-to-date security posture
Pros and Cons
- "The integration of IPS with the firewall is quite efficient."
- "A reduction in price would always be welcome."
What is our primary use case?
I primarily use Check Point IPS as the second layer of security. The first layer includes routers, DDoS protectors, and access lists on other network devices. Check Point IPS is used for threat prevention in the network, not for web applications. I also rely on other solutions for web application firewalls.
What is most valuable?
The integration of IPS with the firewall is quite efficient. It's easy to implement, monitor, and prevent certain situations on the same platform, which is very useful for me. Also, the real-time update function is beneficial. Check Point provides new versions of IPS policies and indicators of compromise, which help us maintain an up-to-date security posture.
What needs improvement?
Currently, the solution is good for my needs, so I don't have any particular improvements to recommend. However, a reduction in price would always be welcome.
For how long have I used the solution?
I have been using Check Point IPS for over ten years.
What do I think about the stability of the solution?
The stability of the solution is very high. I would rate it as ten out of ten. It has been consistently reliable.
What do I think about the scalability of the solution?
Scalability can depend on the environment. In my setup, using a hardware version, scaling is not easy. There's a limitation on the power because it's not a modular harmonic system. Others might find it easier to scale if they use the Harmony solution.
How are customer service and support?
Customer support used to be very good, rating at nine or ten out of ten a few years ago. Recently, it's not as strong, more around six or seven out of ten due to the quality of solutions provided and support handling of cases.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used many platforms for Check Point, including Nokia and Splat, and now I use a dedicated platform for Check Point IPS.
How was the initial setup?
The initial setup was simple, though it was a long time ago.
What's my experience with pricing, setup cost, and licensing?
The price could be lower. It's always better for an end user when prices are reduced. The cost makes it difficult to implement in smaller companies.
Which other solutions did I evaluate?
I have used many vendors and platforms, such as Nokia and Splat along with Check Point, for various security needs.
What other advice do I have?
Overall, I rate Check Point IPS a nine out of ten. I recommend it to other users for its integration capabilities and stability.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 24, 2024
Flag as inappropriateHead of IT at RD Tech
Offers secure network and acts as a security guard
Pros and Cons
- "The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network."
- "The tool's pricing could be better."
What is our primary use case?
I have been using the product as an antivirus. It acts like a security guard, stopping bad things from getting in and ensuring only the right stuff gets through.
What is most valuable?
The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network.
What needs improvement?
The tool's pricing could be better.
What do I think about the stability of the solution?
I rate the tool's stability a ten out of ten.
What do I think about the scalability of the solution?
The solution is 100 percent scalable. My company has 150-200 users, and we plan to add 100 more users in the future.
How are customer service and support?
The tool's technical support is good.
How was the initial setup?
The setup process itself is straightforward, but configuring it can be complex due to the complexity of our network. It can be completed in two days.
What about the implementation team?
The tool's deployment can be done in-house.
What was our ROI?
We can get 100 percent ROI from using the product.
What's my experience with pricing, setup cost, and licensing?
The tool's licensing model is good. The licensing costs are yearly. I rate it an eight out of ten.
What other advice do I have?
The solution exceeded our expectations. The Check Point IPS works with other security solutions, such as Ubiquiti and Bitdefender. Each product has its role in securing our network, devices, and users. We also use Microsoft Active Directory. I rate the tool a ten out of ten. You need to spend time and understand the product's capabilities.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Palo Alto Networks Advanced Threat Prevention
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Cisco IOS Security
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?