The solution is easy to use. I like the monitoring the most.
Network Manager at a retailer with 10,001+ employees
Easy to use with good monitoring features
Pros and Cons
- "The solution is easy to use. I like the monitoring the most."
- "All the advanced features of automation, especially the first installation of tunnels, need improvement."
What is most valuable?
What needs improvement?
All the advanced features of automation, especially the first installation of tunnels, need improvement. Also, in terms of configuration, in terms of tuning, and fine-tuning the system, I think they do make it a bit hard for users. Right now, we need to teach admins, the network and security admins about system fine-tuning in terms of load balancing between CPUs, assignment of processes. I don't think a network admin or a system admin should deal with it in terms of when we are speaking about the firewall or networking device. It should be automatic.
For how long have I used the solution?
I've been using the solution for five to six years.
What do I think about the stability of the solution?
It's a stable solution. There are about 15,000 users installed behind the firewall.
Buyer's Guide
Check Point NGFW
April 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
850,028 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It's a scalable solution. It's very good.
How was the initial setup?
It's easy to install Check Point, but not in the case of a large environment and multiple clusters. This is an ongoing project I can't tell you how long deployment takes. It's a huge network that I have. I have three people maintaining the solution.
What other advice do I have?
I have a basic network firewall and not the advanced feature, full feature security system. I think they are the best. Still, for instance, when installing a tunnel in Check Point vs installing a tunnel in Cisco, the difference is that in Check Point nothing makes sense, and in Cisco you have the duration capability, the hierarchy of the configuration.
I would rate this solution as 8 out of 10. Mostly because of configuration problems - problems with configuring VPNs, and panels, etc.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Soporte técnico superior at Acobo
Secure, helps comply with regulations, and offers good flexibility
Pros and Cons
- "Check Point has given us the ability to comply with regulations and with capacities in a way that we never could before."
- "In the future, some of the features that I would like to see would be the ability to integrate environmental solutions such as the metaverse or blockchain so that we can see them also in applications directly and on mobile devices or natively."
What is our primary use case?
Currently, we have a need for security when it comes to protecting the company's infrastructure on a perimeter basis. We need to cover many branches that must be protected and require a solution that provides us with technological security solutions that allow us to establish and configure in a simple and centralized way for each of the branches.
As a result, we have searched for solutions that meet these requirements, in addition, we are seeking out solutions with technological innovation capabilities constantly.
How has it helped my organization?
Check Point has given us the ability to comply with regulations and with capacities in a way that we never could before. Not only have we managed to secure our network, our infrastructure, and our equipment - we have also managed to gain analysis and additional configurations in each of the complex procedures that are carried out daily.
What is most valuable?
The Next Generation firewalls are quite flexible in many of their characteristics. These devices have blades or sections or small spaces where they have additional features that we can use. That way, we are not only protecting our organization and other branches that belong to our company - we also have other features if the need arises. These are the features that will always help us to put safety first in our organization.
What needs improvement?
In the future, some of the features that I would like to see would be the ability to integrate environmental solutions such as the metaverse or blockchain so that we can see them also in applications directly and on mobile devices or natively.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point NGFW
April 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
850,028 professionals have used our research since 2012.
Senior Network Engineer at Siltronic
Great packet filtering and authentication with good documentation
Pros and Cons
- "The documentation is simple to understand and is easily available."
- "The upgrade is something we would like to be improved in the future as the frequency of hotfixes is too much, and by the time we finish the one round, we already have the new version released and are required to upgrade."
What is our primary use case?
We are using these Next Generations Firewalls to segregate and protect our data center and business-critical data from the user LAN.
We have some of the resources behind these firewalls which should be allowed to a certain set of users only. This is done using the authentication against the Active Directory groups and only the designated users are allowed to access the contents based on the firewall rules.
Along with this, we use IPS and Antivirus features to protect our most critical network.
How has it helped my organization?
The solution is great and simple to implement. It has improved the security posture and overall management of this segregated network.
We have this deployed globally across multiple sites and it's very easy to manage compared to other vendors.
We have been using this solution now for a few years and never came across any issues.
The documentation is simple to understand and is easily available.
The support is also observed to be good and we never had to escalate the cases due to support issues.
What is most valuable?
We have been using Check Point NGFW to protect the business-critical data from the other networks and provide secured access to the users best on the authentication, integrated with the Active Directory.
We have been using packet filtering, stateful inspection, and VPN awareness along with user authentication and have not observed any performance issues in the last several years. If you are looking for a solid solution that is very stable in nature, this is the best choice.
What needs improvement?
We have been using CheckPoint NGFW for quite some time now, and the only thing that could be improved is the upgrade procedure and the frequency of the hotfixes we get.
We have this deployed in multiple sites globally and managed via the central management server. The upgrade is something we would like to be improved in the future as the frequency of hotfixes is too much, and by the time we finish the one round, we already have the new version released and are required to upgrade. We would like to see some improvement in this area.
For how long have I used the solution?
I've used the solution for 15 years.
What do I think about the stability of the solution?
The stability is rock solid.
What do I think about the scalability of the solution?
The solution is easily scalable.
Which solution did I use previously and why did I switch?
It's been a long time since we started using this. When we decided to expand several years before and we decided to go ahead with Check Point and continued with Check Point. We reviewed a lot of other products from different vendors, however, his was chosen as the best by our engineering team and we decided to stick with this.
How was the initial setup?
The set up is very simple and more straightforward than we thought.
What's my experience with pricing, setup cost, and licensing?
The setup cost is pretty much the same as compared to the other vendors. The initial pricing could be slightly better, however, the licensing and maintenance cost is much better compared to the other similar products in the market.
Which other solutions did I evaluate?
Cisco and PaloAlto were the other options evaluated.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
System Administrator at System Administrator
Great SmartDashboard, easy to manage, and offers good security
Pros and Cons
- "It's offering great security while also being rather easy to manage."
- "Unfortunately, as is the case with many big companies, new features seem to always be more important than fixing the last little bugs that affect only a minor customer base."
What is our primary use case?
We use Check Point on a daily basis. It is our primary gateway to the internet, with an extensive rule base that's used to block unwanted connections and protect our internal networks.
Multiple gateways are used in a VPN community to build a secure homogenous company network over the Internet.
We also use the two-factor authentication with RSA-Tokens to authenticate users that are away at conferences or in the home office to the firewall.
RSA is also used on a portal (called mobile access) on the gateway, where users can easily check their e-mails and access company resources.
How has it helped my organization?
Check Point NGFW has proven to be a reliable firewall. We have been using it for over 15 years now.
It's offering great security while also being rather easy to manage.
We evaluated a couple of other firewall solutions over the years, yet always came back for Check Point for a couple of reasons. First, they are the market leader and there are just very many resources online for installing, configuring, debugging, and so on. Second, other firewall solutions may initially be cheaper (especially for basic firewalling), but when you need more features Check Point has a surprisingly good price point.
What is most valuable?
I personally like the SmartDashboard client best, which is the rule base management solution. You have a nice overview of the existing rules, and new rules are easily implemented. You can filter by IP, application, rule number, port, or hostname, so you easily find what you are looking for. Rules can be grouped by topic (internal, external, Internet, DMZ, etc.). It all can be well arranged to suit your needs.
It also offers a dashboard to see recent threats, errors, or other issues with your gateways, as well as Logs for debugging.
What needs improvement?
Unfortunately, as is the case with many big companies, new features seem to always be more important than fixing the last little bugs that affect only a minor customer base.
The command line, for instance, is still needed regularly if you want to dive deeper into debugging certain issues.
While it certainly has improved over the years, it still doesn't feel like a polished product. Some features (e.g. super netting VPN connections) need to be enabled by editing a configuration file, which is sometimes lost upon upgrading to a new version. I'd really like to see more easily manageable debugging solutions.
For how long have I used the solution?
I've used the solution for 15 years.
What do I think about the stability of the solution?
We did have stability issues by using a not officially supported Check Point setup, running it in a virtualization environment, so the Firewall gateway was running on a Xen cluster. In the beginning this was running fine, buter after a couple of months the Checkpoint services kept freezing and needed to be restarted manually. As this started to occur more regularly (a couple of times per week) we migrated the firewall to dedicated hardware.
So I'd recommend always using supported setups.
What do I think about the scalability of the solution?
The biggest enterprises in the world use Check Point products. Scalability is not an issue.
Which solution did I use previously and why did I switch?
We used Microsoft ISA Server, which is a discontinued product before Check Point.
What's my experience with pricing, setup cost, and licensing?
Check Point has a pretty competitive price point if you use the features it has to offer. If you need only basic firewalling other solutions may be better suited to your needs.
Which other solutions did I evaluate?
We evaluated Palo Alto, Fortinet, and Barracuda.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
System administrator at BINDER GmbH
Offers quality patches and hot fixes and has very clear logs
Pros and Cons
- "The activation of additional features is very easy and well documented."
- "The debugging of VPN tunnels is very stressful."
What is our primary use case?
We are using Check Point NGFW for controlling the traffic on our entire network. It controls the traffic and access of the networks and also the traffic outside of our network. The firewalls are used in and HA-Setup.
The features we use are application and URL-filtering, anti-bot/virus, and sandboxing functions. It is also used for Site2Site VPNs and endpoint VPNs. For us, the Check Point NGFW is the center of network traffic and security.
We use the new features of Check Point to reduce standalone systems.
How has it helped my organization?
In the past few years, the attacks and risks have grown. That's why we introduced a NGFW. All the securtiy risks can be minimized with the product. Especially if you route the whole network trafiic over the firewall. You can filter malicious sites and traffic and can analyze the entirety of traffic. The URL filter works much better and is much stronger than our other previous solution.
In the case of migrating or patching, it is very easy due to the fact that you can transfer the whole ruleset and settings from your old device. Patching is very easy and we've never had problems.
What is most valuable?
If you have an HA Setup you will have zero downtime. Teams and VoIP traffic will also not get stuck; you would notice anything while switching to the backup module.
The quality of the patches and hotfixes is great. We never had any issues during or after patching. All patches and hotfixes are well documented and if you have any issues the KB is very helpful.
The log is very clear and can be filtered very easily. If you need to analyze not only the connection you can use the CLI to dump TCP packets.
The activation of additional features is very easy and well documented.
What needs improvement?
Sometimes, the firewall has its peculiarities which you have to know especially when you want to set up a Site2Site VPN with a third-party vendor - specifically if you want to set up IKEv2.
The debugging of VPN tunnels is very stressful. Sometimes you don't know what the firewall negotiates with the other site, so you have to use the command-line for the VPN debugging. However, if you use both sites, the setup is very easy.
The speed could be better when installing policy changes. In the beginning, we didn't have all features active. Now, it is all active and it takes some time to install. This is sometimes annoying if you forget a small change.
For how long have I used the solution?
We've been using this solution for several years. This is our 3rd Check Point firewall.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager at a transportation company with 501-1,000 employees
Easy to set up, stable, and offers excellent technical support
Pros and Cons
- "The packet inspections have been a strong point."
- "I would like there to be a way to run packets that capture more easily in the GUI environment. Right now, if we want to read packet captures, we have to do so from the command line."
What is our primary use case?
It's our main firewall and the first line of protection from outside attacks. We use it to interconnect our remote locations (that use different vendors and equipment) and let the employees work remotely. We're a small site with 300 users and this equipment is more than enough for us. We use almost all the blades and the equipment has run smoothly for years. This NGFW monitors all the traffic outside of the main network, prevents malicious activities, and lets us easily manage network policies to shape our connections.
How has it helped my organization?
We have a lot of flexibility now, and a leg up identifying zero-day threats. We have multiple ways of doing policies now that we didn't have before. The options are more robust than previous products and I would say that we're pleased with the product. The reports I'm getting are that we're satisfied, even impressed, with the options Check Point offers.
There is a scope of improvement in detecting zero-day threats using the SandBlast technology, by introducing emulation of Linux-based operating systems. We have also observed issues while using the products with SSL decryption. There is room for improvement in application-based filtering, as with other firewalls available in the market today. Check Point has improved its application filtering capabilities in the recent past and their latest version, R80, is more capable but still, creating an application-based filter policy is a little cumbersome.
What is most valuable?
It's a NGFW with all of the capabilities required to protect for next-generation attacks at the perimeter level. The module or Security features that are provided as part of the base license with Check Point include (VPN, IPS, Application Control, and Content Awareness) which itself is strong enough to protect the organization.
The packet inspections have been a strong point. Our identity collectors have also been helpful. In many ways, Check Point has been a step up from the SonicWall that we had in-house before that. There's a lot of additional flexibility that we didn't have before.
What needs improvement?
I would like there to be a way to run packets that capture more easily in the GUI environment. Right now, if we want to read packet captures, we have to do so from the command line.
The biggest improvement they could make is having one software to install on all three levels of their products, so that the SMBs, the normal models, and the chassis would all run the same software. Now, while there is central management, everything that has to be configured on the gateway itself works differently on the three kinds of devices.
For how long have I used the solution?
I started using the solution 3 months ago.
What do I think about the stability of the solution?
The web interface was easy for me. The configuration is logical, so it's easy to use and easy to understand how to protect, how to open a port, how to manage, and how to route a device. That's why I prefer Check Point. It's robust and I never have issues with the hardware.
What do I think about the scalability of the solution?
The scalability is quite good. You can scale well across locations for not too much cost. If a company needs to expand, it can do so relatively easily.
Also, cost-wise, it's very affordable to scale up. It's not expensive to add hardware and licenses as needed. They make upgrading very cheap.
We have 200 people on the solution. That said, they are using it with an IPsec tunnel. They don't use all of the capabilities of the hardware. They are using it just to encrypt tunneling between the sites.
How are customer service and technical support?
Technical support has been excellent
Which solution did I use previously and why did I switch?
Yes, we were previously using SonicWall but security is less robust in comparison to Check Point.
How was the initial setup?
The initial setup is very easy.
What about the implementation team?
We implemented it through a vendor called S G Informatics India Pvt Ltd.
The level of expertise I would rate at 10 out of 10.
What's my experience with pricing, setup cost, and licensing?
I would recommend going into Check Point solutions. Although Check Point has the option of implementing your firewall on a server, I would advise implementing it on a perimeter device because servers have latency. It's best to deploy it on a dedicated device. Carry out a survey to find out if the device can handle the kind of workload you need to put through it. Also, make it a redundant solution, apart from the Management Server, which can be just one device. Although I should note that, up until now, we have not had anything like that ourselves.
Which other solutions did I evaluate?
We have looked into Sophos.
What other advice do I have?
The most valuable features are the security blades and the ease of managing the policies, searching logs for events, and correlating them.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Project Manager at a financial services firm with 10,001+ employees
Good centralized management and VSX with great scalability potential
Pros and Cons
- "There is a lot of legacy traffic from other vendors that has been migrated to Check Point which has resulted in a lot of stability in our environment."
- "The product or services can be improved from the cost and the pricing perspective."
What is our primary use case?
The next-generation firewalls are used on the perimeter within a couple of data centers. There are lots of firewalls and we are trying to consolidate everything in the final solution. The MDS and VSX are real solutions that are easing the consolidation across different domains to make management easier. It also improves the overall solution from the operations perspective where BAU teams can leverage different Check Point product lines, like Smart Log, to support customers on a daily basis.
How has it helped my organization?
There is a lot of legacy traffic from other vendors that has been migrated to Check Point which has resulted in a lot of stability in our environment. Moreover, consolidation happening across different legacy environments is being enhanced by the usage of MDS and VSX solutions offered by Check Point. This is making things easier from both a migration and implementation perspective. It offers easy management architecture, and, with Smart Log, makes life easier for the operations engineers and different teams working with Check Point products.
What is most valuable?
The most valuable feature of Check Point is the Centralized Management (MDS) and Virtualization (VSX) for the firewalls. Using these features provides enhanced security with reduced cost across different domains and tenants with complete segregation from the policies database and a user traffic perspective. Using these features is proving to be scalable as things are virtualized and the resources can be increased or decreased as per the demand or usage from a project perspective.
What needs improvement?
The product or services can be improved from the cost and the pricing perspective. There are a lot of other competitors in the market providing similar solutions with more low-cost options. There is no doubt that the great three-tier architecture of Check Point is great, however, when the cost is considered, it proves to be a bit expensive as compared to other products in the market. Also, the licensing and maintenance costs are quite high. Maintaining these solutions proves to be a bit costly to organizations from a day-to-day perspective.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is really good.
How are customer service and technical support?
We are satisfied with the level of support.
Which solution did I use previously and why did I switch?
Yes, we have used a different solution previously and have switched because of the great performance that Check Point offers.
How was the initial setup?
The initial setup is pretty straightforward.
What about the implementation team?
Yes, and we had a good experience.
What was our ROI?
The ROI meets our expectations.
What's my experience with pricing, setup cost, and licensing?
The cost is quite high for Check Point products.
Which other solutions did I evaluate?
Yes, however, I prefer not to say which.
What other advice do I have?
Overall, the solution and product line are good but more competitive pricing can be offered.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
Network Administrator at Aguascalientes
Helpful support, easy centralized management, package inspection facilitates malicious traffic discovery
Pros and Cons
- "Within the organization, the inspection of packages has given us great help in detecting traffic that may be a threat to the institution."
- "The equipment is complex, so you need guidance from specialized people or those who constantly work with Check Point. Better forums and information manuals could be provided so that users from different institutions can have more access to the information."
What is our primary use case?
We support various clients in the government sector in Mexico. We provide different solutions in terms of network security, data security, and perimeter security. The NGFM Firewall is available locally and different offices and/or institutions of the government sector pass through a more secure and controlled infrastructure.
This type of infrastructure has different zones or areas that are managed and keeping them centralized has helped us to maintain and control them. In addition, we are generating fast and safe solutions for our users on each site.
How has it helped my organization?
Check Point has provided us with an easier way to control all of the access traffic for more than 50 segments that we have within the organization. In addition, we have been able to maintain stricter control of the users and/or equipment that are had in all the institutions that make up the government sector of the entity.
Check Point technology has allowed us to keep the organization and distribution of the network in order within the institution. In addition, the VPN service we have has worked correctly for users who want to work remotely from their homes, which was of great help during the pandemic.
What is most valuable?
Within the organization, the inspection of packages has given us great help in detecting traffic that may be a threat to the institution.
The configuration of policies has allowed us to maintain control of access and users for each institution that is incorporated into our headquarters. It is well organized.
Some other of the services that have worked well for us are antivirus, anti-bot, and URL filtering. Together, these have allowed us to maintain control and organization amongst the users.
Another one of the pluses that have helped us a lot has been the IPsec VPN, especially in these times of pandemic.
What needs improvement?
Using the tool is somewhat complex when teaching new staff, although after practice it is quite easy to get used to this technology.
One of the improvements that could be included is to have a help menu to obtain advice or help for the different options that are presented in the application.
The equipment is complex, so you need guidance from specialized people or those who constantly work with Check Point. Better forums and information manuals could be provided so that users from different institutions can have more access to the information.
For how long have I used the solution?
The company has been using the Check Point NGFW for more than four years.
What do I think about the stability of the solution?
Compared to other networking equipment I have used, I would say that Check Point's NGFW is just as stable. We rarely have problems, and they can all be properly fixed without affecting productive or critical network elements.
What do I think about the scalability of the solution?
There are currently more than 5,000 users within government facilities in Mexico. This team has provided us with the necessary resources to provide services to users in record time.
With the teams that we currently have, we have not considered increasing the number of technicians. If the need should arise then Check Point is still a very good option.
How are customer service and technical support?
Technical support has been available when we have problems, and they are always there to help us get back up and running as quickly as possible. In addition, the equipment is kept up-to-date with the latest versions, or alternatively, those recommended by the provider.
Which solution did I use previously and why did I switch?
This solution was deployed before I entered this governmental organization. What I have heard is that prior to this, the security and segmentation control was not ideal and they wanted to improve it. With the implementation of Check Point, great improvements have been provided to the infrastructure, maintaining order within the organization.
How was the initial setup?
When I entered the company, the equipment was already installed. With the passage of time, some configurations have been improved and some extra services have also been achieved for mobile users.
What about the implementation team?
It was implemented through a provider that has been guiding us towards the correct use of the equipment and the best practices to keep it updated. The service has been excellent, both in common day-to-day ticketing situations, including the most serious incidents.
What was our ROI?
It has been well worth the investment, as the Check Point technology is there to help when we need it.
What's my experience with pricing, setup cost, and licensing?
One of the main reasons that Check Point is used is that it helps us to administer security at a reasonable price. This is naturally in addition to meeting the expectations of the institution.
An annual technical support fee is paid to maintain the equipment with the most updated licenses and versions and thus avoid vulnerabilities
Which other solutions did I evaluate?
Check Point is the option that has always been considered for its good firewall organization, which allows us to have excellent security.
What other advice do I have?
My advice is to always have a supplier with whom you can resolve doubts or more specific technical questions. Since the equipment requires many very technical parameters, it is helpful to have a person who understands and uses this technology correctly.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer:

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Untangle NG Firewall
KerioControl
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?