Check Point IPS is an IT security solution that offers insight into potential attacks and helps to prevent them from occurring. This solution gathers various signatures and receives new updates when a new vulnerability is identified, thus safeguarding us from potential threats.
Head of IT Department at AS Attīstības finanšu institūcija Altum
User-friendly, stable, and scalable
Pros and Cons
- "The solution is user-friendly and the interface is easy to configure."
- "The price has room for improvement."
What is our primary use case?
How has it helped my organization?
The solution has helped improve our security by blocking threats.
What is most valuable?
The solution is user-friendly and the interface is easy to configure.
What needs improvement?
The price has room for improvement. The solution's firewalls are quite expensive.
Buyer's Guide
Check Point IPS
August 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The scaling of our system depends on the type of hardware we are using. If we are using a virtual environment, it is easier to scale as we can just add more virtual machines. However, if we are using a hardware appliance, we will need to purchase additional hardware to scale it.
Which solution did I use previously and why did I switch?
Previously we used an IBM solution but it was expensive and hard to configure compared to Check Point IPS which was a common sense model, and easy to implement with our firewall.
How was the initial setup?
The initial setup is straightforward. I give the ease of setup an eight out of ten.
We first deployed the license and configured the rules in test mode. After making sure there were no false positives, we switched the rules to prevent mode to block any incoming attacks. The last part of the process was to configure a certificate for HTTPS inspection.
The deployment took one month to complete.
What about the implementation team?
The implementation was completed with the help of consultants. Two people were required to complete the work.
What was our ROI?
Calculating a return on investment for cybersecurity products can be difficult. However, we have not experienced any concerning cyber incidents in the past five years; this is likely due to our strong firewall and comprehensive production system. All in all, this is a positive outcome.
What's my experience with pricing, setup cost, and licensing?
We pay for a bundle subscription that includes additional solutions.
I give the price of the solution a five out of ten.
What other advice do I have?
I give the solution a nine out of ten.
For maintenance, we need to review the log, identify any new signatures, and configure them accordingly.
The solution is used to protect 250 users.
We could potentially cause disruptions to our infrastructure if we do not use a good consultant to guide us through the implementation process.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Consultant at Tempest Security Intelligence
Great and easy to work with firewall, and prevents important attacks
Pros and Cons
- "The Check Point IPS feature I find the most valuable is the firewall. It is great and easy to work with."
- "What I would like to improve in IPS would be the capacity of the hardware. I would also like to be able to sort signatures by severity. This would greatly impact how well I can manage my environment."
What is our primary use case?
My primary use case for Check Point IPS is very simple: I first identify some signature behaviors and secure levels and then I apply some signatures. I usually do not deploy IPS from CheckPoint. Overall, I manage signatures.
What is most valuable?
The Check Point IPS feature I find the most valuable is the firewall. It is great and easy to work with.
What needs improvement?
I'm not sure what I really like in IPS because it's automated. You read the permit and you try to apply the signature and read the behavior of the solution and find how to fix it. So I don't think Check Point IPS is a great solution.
I don't I like working with it very much because there's other stuff you can do to have more information. However, Check Point IPS does prevent important attacks easily.
What I would like to improve in IPS would be the capacity of the hardware. I would also like to be able to sort signatures by severity. This would greatly impact how well I can manage my environment.
In the next release, I would like to see automatic signature deployment.
For how long have I used the solution?
I have been using Check Point IPS for nearly a year now.
What's my experience with pricing, setup cost, and licensing?
On a scale of one to ten, with one being the worst and ten being the best, I would rate Check Point IPS an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point IPS
August 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Network Engineer at Fujairah Port
Simple to activate, configure, and implement
Pros and Cons
- "IPS logs enable complete visibility and reporting through the smart console."
- "There is no standalone IPS appliance available."
What is our primary use case?
We deployed the Check Point 6300 series firewall for protection of our internal and external servers, and various in-out traffic as well.
We have Windows-based servers, Linux-based servers, and other appliances which are connected through a Check Point firewall. These devices have many vulnerabilities. To secure our infrastructure we activated the IPS Blade on the Check Point firewall.
The IPS has helped us to block many known and zero-day attacks on our network. IPS is one of the best solutions from Check Point firewall
How has it helped my organization?
Check Point IPS has helped us to prevent attacks on our servers and user traffic as well. We have many Windows-based servers has many vulnerabilities. After Check Point IPS is implemented, we blocked those signature-based attacks on our network. Many times I found logs, and IPS has blocked many windows-based signature attacks.
We scheduled IPS updates as per our IT policy and new signature updates are set to monitor mode until a particular period to avoid conflicts after checking the behavior we set back to prevent mode.
What is most valuable?
The switch IPS prevent and monitor mode is a good feature that helps us to avoid any unnecessary impacts on our network.
It is simple to activate, configure, implement and assign profiles and rules to security gateways.
The Check Point IPS database is huge. Signature updates are satisfied. Every two hours, the database receives an automatic update that keeps it current and protects against zero-day vulnerabilities.
IPS logs enable complete visibility and reporting through the smart console. This was a big help to us.
What needs improvement?
I am pleased with it as it seems to be in order. I don't have much to say, however, there were a few things I noticed about the behavior of the Check Point IPS.
First, sometimes I have issues with scheduled IPS updates.
The impact on performance when opening the IPS blade is challenging while the firewall is operating under severe demand is the second, which is pretty common. I only note it here.
There is no standalone IPS appliance available. Only the IPS blade needs to be enabled on the security gateway that Check Point provides.
For how long have I used the solution?
I've used the solution for more than two years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Firewall Engineer at a logistics company with 1,001-5,000 employees
Scalable with convenient pre-defined profiles and an easy setup
Pros and Cons
- "IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
- "Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration."
What is our primary use case?
We have a hybrid infrastructure with an on-premise data center, cloud data center, and multiple branch offices. All of these firewalls are managed via Check Point Multi Domain Management as well as Smart Event to see security events across our environment.
IPS is set primarily to prevent and only some signatures are set to detect (only after some false positives) so we still see them and get notifications via the Smart Event reports.
IPS is updated automatically and pushed to all gateways every two hours.
How has it helped my organization?
Check Point's IPS simply works and is continuously kept up-to-date on all gateways. Via the management, it's possible to let the gateway update the IPS signatures itself, instead of letting the management update itself and then push the updates to the gateways.
If there's a new data center or branch office and everything is still in the test phase, it's possible to set the IPS policy to detect only so you can gather data and create a baseline without completely disabling IPS. That way, you can still see log entries.
What is most valuable?
Automatic updates can be done either via management or the Gateway itself, without any user interaction. The gateway is up-to-date with the newest signatures.
If you're unsure which profile to use, Check Point has some pre-defined profiles according to its best practices. Each one adds a different load to the relevant gateway, so you have to first check the current load and then decide on the right profile.
IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier.
What needs improvement?
You can't turn off IPS completely as there are some signatures that are set even without activated IPS. If you know that, you can act accordingly. But sometimes you have to do a general exception instead of a granular one.
There are always some false positives with non-RFC traffic. This is good for security, however, it will cause some effort in day-to-day business as there will have to be exceptions for certain applications.
Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration.
For how long have I used the solution?
I've used the solution for over ten years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The scalability is quite good, depending on which IPS profile you're using.
How was the initial setup?
The solution is easy to set up.
Disclosure: My company has a business relationship with this vendor other than being a customer. We're a Check Point partner and use their products as well for our own environment.
Associate Consult at Atos
Great updates, good out-of-the-box configuration and very good reporting
Pros and Cons
- "There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection."
- "After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market."
What is our primary use case?
Intrusion prevention and detection are the most valuable pillars in the security system, which detects and prevents exploits or weaknesses in vulnerable systems or in applications and protect against threats not only based on signatures but also based on anomalies, behavioral analysis, etc.
IPS is already integrated and comes as a security license in Check Point NG Firewalls and NGTX Firewalls.
Every defense system must have a feature set that provides complete security for Network IPS and Check Point has very powerful high throughput - almost at terabyte speed - with the help of a hyper-scale approach.
How has it helped my organization?
Organizations can scan for vulnerabilities know as VAPT, which many prefer as one-step closure for maximum security for the entire network. Check Point IPS plays a leading role in patching those vulnerabilities based on CVE IDS.
Based on updates received from the Check Point Threat Cloud, CVE IDs get updated or we can manually add those signatures.
It helps organizations to get a complete report for vulnerabilities in applications, the host running in the network (which helps to fixed to vulnerabilities based on CVE IDs), and gives reports for the compromised host, C&C host, DNS tunneling attempts, and protects against vulnerability in SNMTP HTTP POP, etc.
What is most valuable?
There's a good out-of-the-box configuration for recommended security based on severity levels, confidence levels, and network impact - also known as an IPS Profile.
For better security, we can edit options based on requirements and we can keep actions as detect-only which gives us alerts but allows traffic to flow without stopping anything.
There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection.
Check Point IPS provides reports for running vulnerabilities which help enable SOC teams to respond to the highest-priority events first to patch them.
What needs improvement?
After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market.
Most customers take an IPS license but they don't take a SmartEvent license and when this happens, they will not be aware of the report parts such as current threats in the network open ports/protocol, vulnerabilities in a system, or detected/prevented attacks. For such cases, Check Point should provide a bundled license with IPS.
For how long have I used the solution?
I've been using the solution for more than four years.
What do I think about the stability of the solution?
The solution is highly stable for this particular blade.
What do I think about the scalability of the solution?
Scalability can depend on throughput and if we use Maestro Hyperscale, we can distribute load across multiple Check Point Firewalls to get the maximum (in TPS) throughput.
How are customer service and technical support?
Most of the time there is no need to take support for this, but the CVE closure technical support team helps lot.
Which solution did I use previously and why did I switch?
Customers may have had different NGFW solutions, however, after, they migrated over to Check Point NGFW.
How was the initial setup?
The installation was straightforward in terms of configuration and onboarding.
What about the implementation team?
We are service providers and provide services to customers.
What was our ROI?
Attacks are getting prevented and detected based on severity which helps our organization to get rid of compromising attacks.
What's my experience with pricing, setup cost, and licensing?
Check Point IPS license is a must-have, and users need to make sure the database gets updated on daily basis after every 2 hours as per the defined configuration (which helps to get maximum protection).
The configuration is very simple and effective if you refer to the configuration guide properly.
Which other solutions did I evaluate?
We did not look at any other solution.
What other advice do I have?
The solution is best in class.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Information Security Officer at Abcl
Good visibility and reporting, helpful support, but it can lead to performance degradation
Pros and Cons
- "It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
- "There is a performance impact on the NGFW post-enabling the IPS blade/Module, which can even lead to downtime if IPS starts to monitor or block high-volume traffic."
What is our primary use case?
We use this solution to secure the organization against any attack coming into the network via the internet, a third party, or any other connected network. It is used to detect and prevent identified threats at the perimeter level so attacks do not penetrate the network.
With so many access points present on a typical business network, it is essential that we have a way to monitor for signs of potential violations, incidents, and imminent threats.
We also use it to provide flexibility for the SOC admin to identify any suspicious activity and either detect and allow (IDS) or prevent (IPS) the threat. It logs and reports any such incident to the centralized logger so the required action can be taken by the SOC team.
How has it helped my organization?
This IPS device is protecting the organization's assets from any know vulnerability or threats that are coming from the network and vice versa.
It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level. An example of this is C&C communication, which is getting trigger by compromised systems.
It's able to detect and prevent any tunneling attempt that is happening via compromised systems, thereby avoiding data leakage.
It provides the capability to enable security policy based on templates, which can be enabled by the organization, depending upon their need. For example, enabling the highest security with the lowest performance impact is a matter of selecting templates accordingly.
What is most valuable?
IPS can be enabled on the same security gateway and does not require any additional hardware purchase or additional network connectivity.
It provides complete visibility and reporting on a single dashboard for the entire NG firewall, including the IPS blade on the Smart Console.
Signatures are constantly updated and it also provides virtual patching protection up to a certain extent.
It provides a detect-only mode for IPS Security policy that the admin can enable on a required segment for monitoring, giving an opportunity to observe prior to blocking.
What needs improvement?
There is a performance impact on the NGFW post-enabling the IPS blade/Module, which can even lead to downtime if IPS starts to monitor or block high-volume traffic.
There is no separate, dedicated appliance for IPS.
In the case of the IPS blade enabled on the NG firewall, it does not provide flexibility to monitor specific segments as easily as the IPS policies that are applied on the security gateway. There is lots of configuration and exclusion policy that need to be configured to bypass traffic from IPS Policy.
IPS gets bypass in case performance goes above certain limit. This is the default setting that is provided.
For how long have I used the solution?
I have been using Check Point IPS for more than six years.
What do I think about the stability of the solution?
This is a stable product.
What do I think about the scalability of the solution?
Most of the organization is deployed on the NGFW and it has scaled accordingly, with most devices in HA mode.
How are customer service and technical support?
Technical support is excellent.
Which solution did I use previously and why did I switch?
We did not use another solution prior to this one.
How was the initial setup?
This is a blade/module that needs to be enabled, selected, and applied across the security gateway.
What about the implementation team?
Our in-house team was responsible for deployment.
What's my experience with pricing, setup cost, and licensing?
Enabling IPS does not require any additional license purchase from OEM, as it comes by default with the NGFW bundle. This blade/module can be enabled based on the requirement and can be pushed to the security gateway.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CTO at a computer software company with 11-50 employees
Easy to configure, helpful notifications, and provides good value for the money
Pros and Cons
- "I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden."
- "It is generally good, but improving the performance would be the one thing I'd take a look at right now."
What is our primary use case?
We make use of Check Point IPS to protect our corporate network against incoming threats of all varieties. We have a very minimal intranet/network and this is installed and configured on our firewall that monitors all incoming/outgoing traffic.
We felt it was necessary to have this in place as part of our security hardening in preparation for a third-party penetration test of our corporate network. Their goal was to access our network undetected and exfiltrate information. They were unsuccessful.
How has it helped my organization?
Once we installed our Check Point firewall and activated and configured the various software blades and services, we successfully locked down our network with a near 100% success rate in preventing security threats.
I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden.
The biggest improvement is that it protects us against many different potential attacks like ransomware and malware coming from malicious IPs.
What is most valuable?
The most valuable features of Check Point IPS are the protection it provides against the various attack vectors out there with ransomware and other malware. Once we had Check Point IPS up and running, which was really quite easy and straightforward to do, we noticed a surprising number of times that it was getting triggered.
It was a little scary thinking back to how vulnerable we were prior to having Check Point IPS in place and simply relying on our users, albeit not that many, to be safe and responsible.
What needs improvement?
Really, the only thing we noticed once it was running in prevention mode (we started out in detection mode just to get a feel for how it worked and how often protections were getting triggered) was that there was a little bit of a slowdown in performance. It is generally good, but improving the performance would be the one thing I'd take a look at right now.
For how long have I used the solution?
We have been using Check Point IPS for two years.
What do I think about the stability of the solution?
This solution has been extremely stable with no issues.
What do I think about the scalability of the solution?
We're small and haven't had to deal with scaling, but I would think it should scale fine.
Which solution did I use previously and why did I switch?
We did not use another similar solution prior to Check Point.
How was the initial setup?
The initial setup and configuration was easy and straightforward.
What was our ROI?
Our return, in terms of peace of mind that our network is protected, is well worth the cost of implementation.
What's my experience with pricing, setup cost, and licensing?
The pricing for Check Point IPS is competitive and brings good value for the money.
What other advice do I have?
In summary, since we have installed Check Point IPS, we really have not had any major complaints or requests for improvement. It was pretty easy to get up and running and configured to protect our environment.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at LTTS
Helps prevent unwanted and unknown attacks
Pros and Cons
- "IPS can protect our organization with any old vulnerabilities or if any vulnerability detected minutes ago IPS can protect us as per our configured policy."
- "I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good."
What is our primary use case?
I work in MNC company and we have 6 GEO locations in India and all of our locations are using Check Point as a perimeter firewall. I sit in our HO Office and I am maintaining all the location firewalls with my team, except for 1 location. We regularly monitor the security alerts on our perimeter and based on that we will align our location IT to check and update us. IPS is our core blade for network security, it is provide the details that some suspicious activities happen on our network as per the IPS signature database, and based on that we will work on that.
As our primary use case with IPS blade we are daily receiving non-compliant IKE alert, and we know if we prevented it then what impact will happen, our all site to site tunnel will stop working which is running with noncompliant IKE and we are not forcing our client to update that noncompliant IKE protocol.
How has it helped my organization?
We have configured the IPS daily report on our Check Point Gateway so we get daily reports with details of IPS related alerts. Based on the report we will check whether it is in prevention or detection mode and based on that we will check with the internal team and work on that. This is a very useful blade to prevent unwanted and unknown attacks. We can also create strict policies in the IPS blade to prevent high and critical severity but in our organization, we follow the same but in some cases, we have created exceptions.
Overall with the IPS blade we can say we are secure with unknown attacks.
What is most valuable?
The default category (Low, Medium, High, Critical) is the most valuable feature because we don't know what type of attack will happen, but with this category, we can create a policy to prevent any high and critical severity behavior. With this, we can protect our organization from weakness exploit of vulnerable systems.
IPS can protect our organization with any old vulnerabilities or if any vulnerability was detected within a few minutes. IPS can protect us as per our configured policy.
What needs improvement?
I strongly agree that with IPS blade we can protect our organization vulnerabilities. I would like to have the ability to virtually patch our application or vulnerable machine that is talking ourside our network. If it is there then we can protect our application and systems to any unknown attack if our system or application has a weakness or vulnerability.
I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good.
For how long have I used the solution?
I have been using Check Point IPS for the last four years.
What do I think about the stability of the solution?
Sometimes it will not connect to the threat cloud.
What do I think about the scalability of the solution?
This is a fully salable blade.
How are customer service and technical support?
Overall okay.
How was the initial setup?
Straightforward.
What about the implementation team?
Vendor team
What was our ROI?
Priceless.
What's my experience with pricing, setup cost, and licensing?
Reg. cost and licensing part out procurement team taking care.
What other advice do I have?
The IPS is a very good blade in Check Point NGFW.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Palo Alto Networks Advanced Threat Prevention
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco IOS Security
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?