Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Easy to implement with helpful support and good ROI
Pros and Cons
  • "Check Point IPS manages risk categories very well and accordingly helps us protect each of our devices in real-time."
  • "When entering, it always takes a long time to load."

What is our primary use case?

Check Point IPS was implemented two years ago to protect our infrastructure from threats.

It began by being implemented in local environments with a reduced staff to carry out the corresponding tests and not cause a total company blockage. Once the tests were over, we gradually extended to different departments. We began to use Check Point IPS to be able to provide security of Internet to users using the IPS and anti-virus anti-bot modules, we also apply them to invite us to enter the company and thus monitor outgoing Internet traffic and thus avoid malicious users. Prevention and detection are one of the most valuable pillars of security.

How has it helped my organization?

This tool has allowed us to obtain complete reports of the applications' vulnerabilities, which helps us remedy these vulnerabilities presented by the organization. 

It helped us a lot to monitor the internal traffic keeping monitored each server or user that enters the platform in this way Check Point IPS. It has allowed us to proactively reduce any incorrect configuration of network access that results from delegation. 

One of the points where Check Point needs to improve is in the support they offer, since there we have had a few inconveniences.

What is most valuable?

The implementation of Check Point IPS brought a lot of value to our organization with all the characteristics that the tool shows, starting with great visibility in a single dashboard, which makes it much better. You don't have to go through different tabs. 

Another feature is that it allows you to create multiple rule profiles. We can block directly from the outside without waiting to look at the logs.

With these and other features, Check Point IPS manages risk categories very well and accordingly helps us protect each of our devices in real-time.

What needs improvement?

It is always important to be improving the product to be at the forefront of technology. 

One of the improvements that would be good is to improve the latency in the portal. When entering, it always takes a long time to load. Also, when the tool is already running, you feel a slight decrease in performance.

The application has many facilities when using the tool. The configuration of each of the policies should have filters. 

We need to be able to understand and detect each of the vulnerabilities.

Buyer's Guide
Check Point IPS
June 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

This solution has been used for approximately two year in the company.

What do I think about the stability of the solution?

It's very stable. We never had any issues of it stopping to work. It's been very stable.

What do I think about the scalability of the solution?

We have not observed any significant performance impact on the firewall gateway by enabling the IPS module.

How are customer service and support?

The Check Point engineer we dealt with during setup had a lot of experience. His working knowledge helped us with the implementation.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

It is the first time that we've implemented a tool of this type.

How was the initial setup?

We implemented the product in-house with the aid of support as part of a POC.

A Check Point engineer who had a lot of experience helped us with the implementation.

What about the implementation team?

We implement the product internally with the help of support.

What was our ROI?

Attacks are prevented and detected based on severity, helping our organization eliminate compromising attacks. When making an investment with these tools, you are taking care of an important aspect that will double your profits.

What's my experience with pricing, setup cost, and licensing?

With Check Point, the IPS license could be included with the firewall product. Therefore the cost of the license is not huge.

Which other solutions did I evaluate?

Other solutions were not evaluated. We have always worked with Check Point products.

What other advice do I have?

One piece of advice is to have the latest database. You want to be protected against the latest attacks.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jay Philip - PeerSpot reviewer
Solutions Manager at Cell info
Real User
It protects against a the latest threats, but the setup is too complex for the average customer
Pros and Cons
  • "Check Point offers DDoS and endpoint protection called EDR or XDR, so it provides a holistic security architecture for any organization."
  • "Setting up Check Point IPS isn't easy, but it's not too complex, either. I rate it seven out of 10 for ease of setup. Generally, customers cannot do it themselves. They need an integrator."

What is our primary use case?

Check Point IPS is focused on prevention rather than strictly detection capabilities.

How has it helped my organization?

IPS enables us to secure our clients against the latest cyber threats.

What is most valuable?

Check Point offers DDoS and endpoint protection called EDR or XDR, so it provides a holistic security architecture for any organization.

For how long have I used the solution?

I have been working with Check Point IPS for around five years.

What do I think about the stability of the solution?

Check Point IPS is stable.

What do I think about the scalability of the solution?

I rate Check Point IPS seven out of 10 for scalability.

How was the initial setup?

Setting up Check Point IPS isn't easy, but it's not too complex, either. I rate it seven out of 10 for ease of setup. Generally, customers cannot do it themselves. They need an integrator. 

Pre-planning is necessary. You need to clearly define the use case and the specific policies the customer wants. IPS doesn't require any maintenance after deployment.

What was our ROI?

My customers see a return in about three months' time. 

What other advice do I have?

I rate Check Point IPS seven out of 10. Check Point is doing some ongoing consolidation. They are trying to unify the look and feel of the on-premise and cloud. That's in the roadmap, so that's why I'm giving it a seven. Once that is unified, maybe I will bump it up to 10. 

If you are an SMB customer, Check Point has prepackaged suites that are cost-effective and best for the total cost of ownership.  If a customer is asking for something specific I will probably recommend Palo Alto. It depends on use case scenarios. This was a perfect fit for my current customer's use case scenarios.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Buyer's Guide
Check Point IPS
June 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Paola Zúñiga Rojas - PeerSpot reviewer
Agente de servicios al cliente at Grupo Purdy
Real User
Great predefined visualizations, good integrations, and helpful alert capabilities
Pros and Cons
  • "Some of the features for views and visualization are already predefined as default files."
  • "The service that we want to see in the future is a capacity to segment the IPS services by equipment."

What is our primary use case?

One of the needs that we had within our organization was the need to solve and support the prevention of zero-day attacks or vulnerability attacks within the network. We needed to be as proactive as possible to focus on solving any incident or gap that could be opened in the future within our organization. With this product, we were able to implement IPS solutions. IPS gives us the ability to detect and be proactive against many attacks - even if they are very new. The solution can detect old and new signatures. 

How has it helped my organization?

Check Point IPS services give our organization peace of mind. We know that the solution will be running and constantly updated thanks to the integrated Check Point services. It ensures stability. We have a solution that covers us all the time, day and night. In the configuration process, the solution has provided us with detection regarding what is stable. It is scalable and will allow us to grow according to the demand and the need. The service is well-maintained and functional.

What is most valuable?

The solution with the most organizational value is its 360° view, which has allowed us to integrate it well and speed up the view of records. It is dedicated 24/7 to detecting any attack. Vulnerabilities or incidents be flagged. It has the capability to give us alerts and offers good productivity to ensure that the services and data of our organization are always secured. 

Some of the features for views and visualization are already predefined as default files. This helps us to be proactive and not have to define any search or specialty of the services.

What needs improvement?

The service that we want to see in the future is a capacity to segment the IPS services by equipment. We'd like to see the integration of the communication of the services in the next-generation firewall and the other solutions that it has, such as Harmony. It would be great if they could start creating interoperability with both technologies. Integrating these solutions with the lighthouses could generate more complex and complete interoperability. That said, we'd want the solutions to be acquired and administered as one solution. 

For how long have I used the solution?

We have been using the service for about two months.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Zdenek Zeithaml - PeerSpot reviewer
Network Security at a insurance company with 51-200 employees
Real User
High availability, helpful support, and effective management of devices and policies
Pros and Cons
  • "The most valuable feature of Check Point IPS is the management of devices and policies."
  • "Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns."

What is our primary use case?

We are using Check Point IPS for the detection and prevention of threats for our PCI firewalls where it's mandatory to use it.

What is most valuable?

The most valuable feature of Check Point IPS is the management of devices and policies.

What needs improvement?

Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns.

For how long have I used the solution?

I have been using Check Point IPS for over five years.

What do I think about the stability of the solution?

Check Point IPS is stable.

What do I think about the scalability of the solution?

The stability of Check Point IPS depends on too many factors. It always depends on the usage and the traffic. However, we did not have any issues with scalability.

We have approximately 40 to 50 people involved in using Check Point IPS, such as the firewall and IPS managing teams.

How are customer service and support?

We have onsite engineers from the Check Point IPS directly on our site.

I rate the support from Check Point IPS a four out of five.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of Check Point IPS is straightforward because there are security profiles with default recommended configuration. However, these were beneficial at the time when produced but they are not that helpful anymore. 

It can take some time to do verification because there are some protocols where you know that there could be problems. For example, for some of the sharing features, you have to be careful. Those there are the profiles you can use for the setup, you do have to do a lot of manual work to have everything work correctly.

I rate the setup of Check Point IPS a two out of five.

What about the implementation team?

We did the implementation of Check Point IPS in-house.

What's my experience with pricing, setup cost, and licensing?

There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive.

What other advice do I have?

We are replacing the IPS from Check Point with a different solution, which is related to the IPS functionality. The reason for the replacement is because Check Point IPS are at their end of life and are not creating or not using the security policy for the traffic, it mostly acts as an IPS.

We are planning on using Trend Micro. It will be better because there will be a dedicated device that is doing only the IPS. The performance will be better and it has a larger number of patterns updated weekly.

I have a very long and extensive experience with the Check Point ISP. It is a good solution, but sometimes it's causing issues, but it's a general problem for all the networks and security devices.

I rate Check Point IPS a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Great monitoring, less admin burden, and protects well against malware
Pros and Cons
  • "There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network."
  • "When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite."

What is our primary use case?

The company needed to improve its compliance with traffic risk management before all the company employees went full WFH. 

This has turned into a more efficient operational control of internal traffic, where numerous threats had been identified while working in the office as most malware is somehow admitted by someone with access to the company network, either unintentionally or not. This actually drove revenue growth as fewer resources had to be spent from the IT department to fight cyber threats.

How has it helped my organization?

We've seen how this firewall has operated on real-time threats to both cloud and physical servers by detecting, neutralizing, eliminating, and then patching against malware. 

We can test these patches post-deployment in less than one day. We'll then generate reports that include the activity for the time we desire and gauge the performance of the software. 

From all this data, the IT department can determine future precautions, what kind of traffic will be blocked, and what users will be restricted.

What is most valuable?

We've been able to monitor all the devices in the network after activating and configuring the software blades. This shows us who's connected and who's not and how many disconnections there have been. 

The firewall picks up malware traces that may have affected other users and networks and notifies when a particular site has been the source of infection. 

There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network.

What needs improvement?

When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite. 

There are updates that have been scheduled that have been delayed more than expected, which impacts the performance of the firewall when the traffic is high. This can cause false positives and release alerts for harmless traffic, which results in a deviation of the attention from the security administrator when it's not relevant.

For how long have I used the solution?

We've used Check Point's complete protection package for our network for more than two years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1164006 - PeerSpot reviewer
Director Of Information Technology at a security firm with 1-10 employees
Real User
Helpful alerting, provides valuable network insights, and the pricing is negotiable
Pros and Cons
  • "Overall, it give me a lot of insight into my network that I didn't have before."
  • "The pain point that I have with this solution is contacting technical support."

What is our primary use case?

We primarily use Check Point to provide visibility into our network. It lets us see the east-west traffic, and it gives us a lot of information to work on as far as what kind of traffic was passing through.

How has it helped my organization?

Overall, it give me a lot of insight into my network that I didn't have before.

What is most valuable?

It lets us know about anomalous behavior and it provides alerts regarding activity on certain ports. It lets me decide, for example, whether something is a valid connection, or causes me to question why a certain port is open.

What needs improvement?

The pain point that I have with this solution is contacting technical support.

For how long have I used the solution?

I have been working with Check Point IPS for more than a year.

What do I think about the stability of the solution?

Stability-wise, this product is great.

What do I think about the scalability of the solution?

The scalability comes from the fact that this is an on-premises device that ties into a cloud service. It's a hybrid application. Once you have it installed, it's collecting information. You put it right there in front of your input into the network, and it picks up all of the traffic.

How are customer service and support?

Sometimes, technical support takes a long time to get back to you.

Which solution did I use previously and why did I switch?

I used Check Point Endpoint Security, as well as the Network Detect and Response (NDR) appliance.

I am currently using Darktrace and Vectra in addition to Check Point. I've been using all three and I find that Check Point is the one where I get the most information from. I will stop using Vectra this year but I will retain Darktrace, as long as they keep it at a certain price.

Darktrace takes a lot more configuration; unlike Check Point, there are a lot more changes that need to be made. When it's fully integrated, it requires a lot of time and it may end up being as useful as the Check Point.

The reason I keep all three is because they all give me a different kind of view. They all give me different information. If they gave the same information, it'd be useless to keep them.

With respect to similar security products, I have demoed CrowdStrike, worked with Symantec, and am also using Check Point.

How was the initial setup?

Check Point was fairly usable out of the box.

I am using an on-premises appliance that ties into a cloud service.

What's my experience with pricing, setup cost, and licensing?

Pricing for this solution is negotiable and I'm happy with our pricing.

I suggest negotiating either at the end of their fiscal year or at the end of every quarter. At the end of the quarter, they have an incentive to lower the prices to sell as many units as possible in order to meet their end-of-quarter quota.

What other advice do I have?

If I could only keep one of my security solutions, it would be Check Point. To me, it provides the most valuable information.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1591110 - PeerSpot reviewer
ICT at a manufacturing company with 501-1,000 employees
Real User
Top 20
Customizable with good alerts and controls traffic well
Pros and Cons
  • "The possibility of customizing the rules is great."
  • "Sometimes we had false positives where packages that were legitimate for us were blocked and we had to unblock them through exceptions."

What is our primary use case?

We use this product to control incoming and outgoing traffic to the company and to control the internal traffic between the various company subnets. 

We have many departments and have segregated the traffic via subnets controlled by the Check Point firewall. 

We also have some services exposed on the internet for which it is necessary to have control over intrusions. 

Our reality is made up of a series of Check Point firewalls in which we have activated the intrusion prevention system functionality.

How has it helped my organization?


With the introduction of this Check Point solution our company has significantly increased the level of perimeter security, once this was done we proceeded to configure the service also for internal networks where there was a need to control traffic.

With the introduction of Check Point, our company has significantly increased the level of perimeter security, once this was done we proceeded to configure the service for internal networks where there was a need to control traffic.

We are quite satisfied with the product.

What is most valuable?

The possibility of customizing the rules is great. Sometimes it appears a bit rigid yet it is still easy to use. There is an easy application of policies once the basic configuration has been done with the possibility of copying profiles to make them better meet all the needs of the companies. 

There's also the possibility to set alerts only in order to check whether a signature can cause problems or not before blocking traffic and causing damage to users. 

Overall, it seems like a good product even if sometimes a little unintuitive. That said, it is no worse than others.

What needs improvement?

The product could be improved in its configuration interface. I have seen that there are more points where exceptions can be made but it is not always intuitive to find the right point where to make them. 

Sometimes we had false positives where packages that were legitimate for us were blocked and we had to unblock them through exceptions. 

I don't see any other big problems and I hope not to find others in the future

For how long have I used the solution?

I've used the solution for five years.

Which solution did I use previously and why did I switch?

We did not previously use another solution.

Which other solutions did I evaluate?

We did not evaluate other options. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
IPS Blade - excellent tool - CHP
Pros and Cons
  • "The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action."
  • "Despite being a blade, this is expensive."

What is our primary use case?

We needed a security tool with features like:

  • Exploit detection
  • Vulnerable Protocol Validations
  • Malware communication blocking
  • Easy administration

We found these features in the Check Point Intrusion Prevention System. It's the exact protection required for our infrastructure.

We managed to increase the level of business security thanks to this blade provisioned within our Check Point gateways.

Thanks to the use of this tool, we could avoid malware that might be installed in our infrastructure. It offers prompt detection.

We also needed to be able to have protection against emerging threats during Microsoft updates on our Windows servers.

How has it helped my organization?

This tool gave us much more protection for areas that are not covered with the use of the gateways.

One of our great concerns is the patching of servers where Internet access is opened and where we may have vulnerabilities. Thanks to Check Point's Intrusion Prevention System (IPS), we could keep our environment safe.

It provides a centralized environment by being unified with the administration of our gateway environments with management through Check Point Security Management. It is easy to use and has large dashboards that help us make decisions that help us continue to improve security.

What is most valuable?

Check Point's Intrusion Prevention System (IPS) provides us with many important features such as:

1- A centralized environment, managed by the security management portal.

2- Real-time protection against threats, generating security so that we can act immediately when we have a threat.

3- Protection backed with thousands of signatures of prevention and malicious behavior.

4- The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action.

It really is a complete tool.

What needs improvement?

Check Point's Intrusion Prevention System (IPS) may improve in the following fields:

- They should have a cost improvement. Despite being a blade, this is expensive.

- They do not have a separate console.

- The documentation accessible by the manufacturer is generally for versions R80 or less. Some features or configurations have changed, which makes a more efficient and faster implementation difficult.

- The costs are only visible through a partner who provides you with the details. We would like them to be public so that we do not only have to view the costs through them.

For how long have I used the solution?

We use this blade for a branch in our cloud environment. We have it in order to be able to support against intrusions for at least three years now.

What do I think about the stability of the solution?

We have cluster environments and we have found its stability to be quite good.

What do I think about the scalability of the solution?

In cluster and VSS environments in Azure, the scalability is robust.

Which solution did I use previously and why did I switch?

Previously we did not use an IPS tool. It wasn't until the business need was realized when that we started the validations of which tool to implement.

What's my experience with pricing, setup cost, and licensing?

It is always important to validate the costs and characteristics of the available tools. I recommend finding a partner that can provide that support to correctly deploy what is necessary.

Which other solutions did I evaluate?

It is very important to always look for documentation, and characteristics and be able to compare them to make an informed decision based on security needs. In our case, we already have tools within our GWs environment, so it was easy to add this product.

What other advice do I have?

It is a good tool. However, you must have a GWs environment in use to be able to add it.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.