We have deployed Check Point firewalls for perimeter security and also for filtering East-West traffic.
Check Point helps in improving perimeter security along with giving insights into different kinds of traffic and attacks.
Isolation between different tiers of APPs is critical for us and Check Point is utilized for handling high traffic volumes of East-West traffic.
We are leveraging the VPN module on the perimeter firewall for users to access the VPNs. VPN authentication is integrated with RSA for multi-factor authentication.