It has allowed us to provide protection that we did not have before. We have tested and reviewed different solutions throughout the year to establish the best solution that would allow us to meet internal demands based on the products our organization sells and makes available from third parties. We need to protect information from those catalogs the database users who are willing to purchase services with us and at the same time we need to keep them protected. We need a safeguard from cyber threats to reduce downtime in costs associated with attacks and a potential loss of communication against our services in the data center.
Perimeter Security Administrator at a security firm with 51-200 employees
Great protection from cyber attacks and DDoS with reduced downtime
Pros and Cons
- "Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
- "There is an issue with precision."
What is our primary use case?
How has it helped my organization?
Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization. We get an environment with protected data centers where there is no interruption of services and no significant loss (including reputational loss) to our company.
What is most valuable?
By having a solution that allows us to protect systems and data from cyber attacks or unauthorized instructions (including malware and DDoS attacks), we can protect our system from all kinds of threats. Check Point reduces downtime and costs associated with attacks that cause communication losses and guarantees compliance with security. It also ensures the privacy of all the data that we have stored, which helps us maintain a high level of reputation when it comes to careful administration and data segmentation. Now, there is a formalization of data protection. Check Point is really compatible with the internal needs of our organization, and its features offer us a great advantage.
What needs improvement?
There is an issue with precision. There is room for improvement based on the type of threats that are constantly evolving. They need to ensure they are managing to keep up with threat changes and generate some new approaches.
Another feature that I would like to see as a substantial improvement is the expansion of support in cloud environments. We need to ensure we can have access to public and private clouds and need to be able to include integrations with different popular providers.
They need to offer IoT as device support.
Buyer's Guide
Check Point IPS
June 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Database Administrator at Ordina
Great unified system with impressive protection and helpful support
Pros and Cons
- "Real-time protection has blocked most threats that could affect system operations."
- "The cost is high."
What is our primary use case?
This tool seals any loopholes that could be detected by ransomware attackers and may lead to data loss. It has protected the organization from potential vulnerabilities affecting operations and the slowdown of workflows. It ensures that the applications are performing efficiently based on the set objectives. It delivers many signatures that enable teams to ascertain the security situations in various departments. It saves the organization a lot of costs since it is less costly and more powerful than many versions in the market.
How has it helped my organization?
Digital transformation has been efficient and productive thanks to the operation of this great product. After the implementation of IPS, there is increased production, and teams can easily focus on more productive tasks without fear of being attacked by cybercriminals. We have accelerated operations with the modern data management models that come with this application. It is easy to detect threats in advance and plan effectively how to eliminate them. Our organization has been secure since we deployed this tool without cases of external attacks.
What is most valuable?
Most features in this platform have been of great importance in the organization. The unified system controls the security situation in any system, reducing the total cost of ownership. Real-time protection has blocked most threats that could affect system operations. It can detect and prevent the entry of known and unknown data vulnerabilities.
The customer support services are efficient and have always helped us achieve most goals. The platform provides continuous cyber security reports that enable us to plan and make informed decisions.
What needs improvement?
The set features have played important roles in transforming the organization to meet the basic security standards.
The cost is high. That said, depending on the company's size, there can be a mutual agreement for efficient licensing terms. We are satisfied with the set performance parameters that have enhanced the smooth running of workflows.
The team should focus more on timely updates and configuration processes that sometimes may fail. I like the performance of this product and the achievements we've made so far.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It is stable, and I recommend it.
What do I think about the scalability of the solution?
I am impressed by the performance.
How are customer service and support?
The customer support staff is always supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a different solution.
How was the initial setup?
The initial set up was not complex.
What about the implementation team?
Implementation was done through the vendor.
What was our ROI?
There is increased ROI.
What's my experience with pricing, setup cost, and licensing?
The setup cost is good.
Which other solutions did I evaluate?
I have not evaluated other options.
What other advice do I have?
The security measures are effective and I'd recommend the product to companies seeking great performance.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point IPS
June 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Soporte técnico superior at Acobo
Great visualizations with helpful event analysis and centralization features
Pros and Cons
- "Its event analysis and centralization features are very important for any organization."
- "I would like to have the possibility of adding features to this IPS solution in the future."
What is our primary use case?
This solution allows us to achieve a healthy network and good security within our organization given its functions, management, and control. The level of detection and intelligent algorithms that protect against distributed attacks have helped us to secure ourselves and provide protection in real time. These capacities and needs complement our security based on a scheme that our fund or financial distribution can achieve under annual or quarterly protection measures (or every three years).
How has it helped my organization?
Check Point offers us good protection. It has also allowed us to acquire services and products under a scheme that allows us to put together, as if it were, an offering of different functions or characteristics, giving added value to each one of them when they connect to each other. It is a solution that we can constantly build with each of the blades that we add. This makes it possible for us to have savings based on the security structure that we need for the organization. Thus it is a solution that has saved us significantly in additional investment when dealing with security.
What is most valuable?
Speaking of the IPS solution, it is important to understand that each of these features is based on real-time detection, analysis, and centralization of events. We were able to interpret that the solution is a total complement to each of the needs that any organization may have. Its event analysis and centralization features are very important for any organization. Those allow you to generate a general visualization, making a complete panorama of each of the events that you have inside your security system.
What needs improvement?
I would like to have the possibility of adding features to this IPS solution in the future. It allows us to reach and integrate with other solutions that we have in the same portfolio of this security provider. It has the possibility of achieving and integrating the detection and analysis of this equipment against the integration and analysis that is done in the final devices, generating a correlation and installation of agent propagation from an internal security center.
For how long have I used the solution?
I've used the solution for four years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at ITQS
Integrates well with other solutions, give broad visibility and offers good detection capabilities
Pros and Cons
- "Among its great features is the ability to detect outgoing malware or extraction of compromised data and stop it, thus safeguarding us by isolating the network, the equipment, or the identity of the affected users."
- "We want the solution to continue to move towards cloud-based and portability focused for telecommuting users."
What is our primary use case?
They are one of the blades that we get to try or use more when we start using Check Point Firewall products. They give us the power of protection and security accompanied by other characteristics and solutions that together become the best in the market. It's uniting all that computing power with the cloud and thus giving organizations greater peace of mind and closing our security gaps in applications or services. Something that we love is that it can be enabled in any gateway, and therefore that saves us implementation time.
How has it helped my organization?
It came to help us in many ways. The most outstanding was being able to have broad visibility and being able to make threats visible in real time. We are able to integrate it with smart events, which allows us at the SOC level to have a complete and reliable panel that saves time for security in visualizing and responding to events of this nature.
Among its great features is the ability to detect outgoing malware or extraction of compromised data and stop it, thus safeguarding us by isolating the network, the equipment, or the identity of the affected users.
What is most valuable?
The IPS feature is available in all appliances that we are going to use as a firewall, and that is how we have a blade that helps at all times. We have both a firewall and also a complete solution with multiple new-generation features that can be physical or virtual and where more advanced analytics can be integrated, for example, in the Infinity Check Point cloud. Among those characteristics is its coverage of updates in real-time and constantly. This is done without an administrator's intervention.
What needs improvement?
What I want as a new feature is to be able to bring these solutions to public clouds. However, today, we can do this. We are taking our datacenters, these next-generation places. These technologies evolve at an unparalleled pace. This solution will soon be in mobile services, and it is here that the new equipment management lines will be managed in the future. We want the solution to continue to move towards cloud-based and portability focused for telecommuting users.
For how long have I used the solution?
I've used the solution for about two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at Fujairah Port
Simple to activate, configure, and implement
Pros and Cons
- "IPS logs enable complete visibility and reporting through the smart console."
- "There is no standalone IPS appliance available."
What is our primary use case?
We deployed the Check Point 6300 series firewall for protection of our internal and external servers, and various in-out traffic as well.
We have Windows-based servers, Linux-based servers, and other appliances which are connected through a Check Point firewall. These devices have many vulnerabilities. To secure our infrastructure we activated the IPS Blade on the Check Point firewall.
The IPS has helped us to block many known and zero-day attacks on our network. IPS is one of the best solutions from Check Point firewall
How has it helped my organization?
Check Point IPS has helped us to prevent attacks on our servers and user traffic as well. We have many Windows-based servers has many vulnerabilities. After Check Point IPS is implemented, we blocked those signature-based attacks on our network. Many times I found logs, and IPS has blocked many windows-based signature attacks.
We scheduled IPS updates as per our IT policy and new signature updates are set to monitor mode until a particular period to avoid conflicts after checking the behavior we set back to prevent mode.
What is most valuable?
The switch IPS prevent and monitor mode is a good feature that helps us to avoid any unnecessary impacts on our network.
It is simple to activate, configure, implement and assign profiles and rules to security gateways.
The Check Point IPS database is huge. Signature updates are satisfied. Every two hours, the database receives an automatic update that keeps it current and protects against zero-day vulnerabilities.
IPS logs enable complete visibility and reporting through the smart console. This was a big help to us.
What needs improvement?
I am pleased with it as it seems to be in order. I don't have much to say, however, there were a few things I noticed about the behavior of the Check Point IPS.
First, sometimes I have issues with scheduled IPS updates.
The impact on performance when opening the IPS blade is challenging while the firewall is operating under severe demand is the second, which is pretty common. I only note it here.
There is no standalone IPS appliance available. Only the IPS blade needs to be enabled on the security gateway that Check Point provides.
For how long have I used the solution?
I've used the solution for more than two years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at VSP Vision Care
Details vulnerability data, protects against malicious attacks well, and easy search capabilities
Pros and Cons
- "It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security."
- "The dashboard reports can be easier to generate and customize."
What is our primary use case?
We use the Check Point IPS module on various firewall gateways. Specifically, we use the IPS on our DMZ firewall gateway to protect our DMZ servers from the inbound Internet traffic.
For our user outbound Internet traffic, we use the IPS and the anti-virus anti-bot modules, in addition to the base IPS module to protect the network traffic.
We also apply the product to our guest firewall gateway to monitor outbound internet traffic, with a focus to avoid any malicious guest users using our guest internet services to launch attacks.
How has it helped my organization?
The Check Point IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users.
We have configured the Check Point IPS modules so all the downloaded updates would turn to monitor-only mode. Once the updates have been in use for a couple of weeks, then we would review the IPS signature, and turn them into prevent mode based on factors such as the severity of the vulnerability, the performance hit to the firewall gateway, the chance of false positives, and the relevance to our environment. This allows us to easily maintain up-to-date network protection with a lower chance of unexpected business interruption.
What is most valuable?
The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.
It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security.
Also, you can easily search through thousands of IPS signatures using various keywords is another feature worth noting.
What needs improvement?
Out of the box, the number of built-in reporting and dashboards related to the IPS logs and events has room for improvement. The dashboard reports can be easier to generate and customize.
It would also be nice if the system would allow some form of alerting when specific signatures have been triggered X number of times within Y amount of time. This would allow us to be better notified when there is a security attack going on, without too much of false-positive alerts.
Another would-be-nice request is to have more details information about how the signatures would detect the specific security vulnerability. This allows us to make a judgment about how useful a particular signature is in our specific environment.
For how long have I used the solution?
I've used the product for over ten years.
What do I think about the stability of the solution?
The stability should be high as we don't have many issues with the IPS solution. In the last couple of years; we only had one issue due to a bad signature.
What do I think about the scalability of the solution?
We have not observed any major performance hit to the firewall gateway by enabling the IPS module. Of course, some signatures did indicate a high-performance hit to the gateway, in which we typically won't turn on those signatures unless there is a strong need.
How are customer service and support?
Good technical support is by chance/luck. Sometimes you run into good tech support. Other times you may run into someone that doesn't know much more than yourself.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We also have extensive experience with the Cisco Firepower solution. We actually use both solutions in our environment.
How was the initial setup?
The initial setup is pretty simple so long you just follow the default steps, without too much worry about going through the thousands of signatures manually.
What about the implementation team?
We did a self-install.
What's my experience with pricing, setup cost, and licensing?
With Check Point, the IPS license could be bundled with the firewall product and so the license cost is not huge.
It does take time to get familiar with the UI and understand the "workflow" that Check Point has in mind when designing the solution. A good understanding of this would allow an easier adoption.
Which other solutions did I evaluate?
We use both Check Point's and Firepower's solutions in our data center.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems en networks engineer at CB
Updates signatures quickly, offers good reports, and is straightforward to set up
Pros and Cons
- "I can generate reports for management automatically based on the threats of the last day/week/whatever is needed."
- "Sometimes protections are 'aggregated' into a single threat name when you look at the logs. I would prefer to see all protections named individually (for example, right now, 'web enforcement' is a category that contains several signatures)."
What is our primary use case?
The product protects our environment from specific threats; we 'approve' signatures manually (or automatically) based on the applications/appliances in use in our company. We are a logistics company hosting several websites/order management. The company is about 1000 FTE across several locations (in the Netherlands & Belgium). We have been using this for the last 10 years at least (since I have worked at the company). It's easy to use. The reporting is good. Usually, when threats emerge on the internet, there are signatures for this within a few hours.
How has it helped my organization?
We manually approve the signatures daily, for the software/appliances that we use. Based on the experience of the administrator, we prevent threats if they are present in our network; and we sometimes use the signatures in detect mode to gather intelligence (for instance to detect TLS1.0/TLS1.1 usage through the firewall).
This has helped us to identify several key webservers that would be vulnerable to 'downgrade attacks'. We could easily identify the vulnerable servers and remediate the issue based on the information we got from the reports we can generate.
What is most valuable?
The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats.
Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed.
It also clearly states the performance impact of a signature and the 'confidence' of a signature so you can quickly evaluate if you need to start panicking or not.
What needs improvement?
Sometimes protections are 'aggregated' into a single threat name when you look at the logs. I would prefer to see all protections named individually (for example, right now, 'web enforcement' is a category that contains several signatures).
I also wish there was an option to run reports of the individual signature 'usage'; it's not easy to generate views based on the number of 'hits' a signature has generated. (it is possible, however, there could be an easier option). For example, if you have a signature activated, for instance, a MS issue then patch your environment, it's 'hard' to identify if the individual signature has been 'hit'.
For how long have I used the solution?
I personally have used the solution since December 2012 - almost 10 years.
What do I think about the stability of the solution?
It's very stable. I haven't seen issues with signatures, downloading, or implementing the signatures, or the 'hits' that it generates.
What do I think about the scalability of the solution?
The product is very scalable; if you size your requirements properly when buying and don't 'prevent all signatures' and customize it for your environment.
How are customer service and support?
Customer support is fine. We have a vendor we use, and, if needed, can fall back on Check Point (I had a few very good remote sessions when we had issues with our firewall; no issues were seen with IDS/IPS).
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The company I work for has used it since I've worked there; no switching was needed. We are happy with the solution.
How was the initial setup?
When implementing the solution, you must activate the blade on your firewall and decide if you want to do it manually or automatically and then (when doing it manually) approve/detect/ignore the relevant signatures. It is pretty straightforward.
What about the implementation team?
We had a vendor team install the firewall and handle the basic configuration, then we went on training. In terms of implementation, I can do it myself now. The vendor team was very good and had a high level of expertise.
What was our ROI?
I'm a network admin; not involved in the money.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to bundle the things they want; so they get a cheaper offer.
Which other solutions did I evaluate?
We've had the same solution since I've worked there.
What other advice do I have?
I am happy with the solution and have been using it since i started working for the company (10 years now). I dont want to be without it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Has valuable integration, stability, and scalability
Pros and Cons
- "The integration is a valuable feature."
- "The solution’s deployment could be easier."
What is most valuable?
The integration is a valuable feature.
What needs improvement?
The solution’s deployment could be easier.
For how long have I used the solution?
I have been using Check Point IPS for three years.
What do I think about the stability of the solution?
There was no issue with the solution’s stability.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
We ask about issues with the technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
The initial setup is not easy. You have to configure the same type of menu for each channel and send it to the portal. You can verify the name from your website.
What other advice do I have?
Check Point IPS is a brand and solution for protection.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller

Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Palo Alto Networks Advanced Threat Prevention
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Cisco IOS Security
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?