What is our primary use case?
We work with these firewalls for overall security, including content filtering.
How has it helped my organization?
High-capacity and high-capability devices help us to integrate with the cloud infrastructure as well as internet applications.
What is most valuable?
The most valuable feature is the URL filtering.
It also gives us a single console for everything. Rather than having one device for URL filtering and a different device as a firewall, this gives us everything in one place.
What needs improvement?
It would help if they were easier to deploy, without needing more technical people. It would be nice if we could just give basic information, how to connect, and that would be all, while the rest of the setup could be done remotely.
For how long have I used the solution?
I have been using Check Point NGFWs for six years.
What do I think about the stability of the solution?
They're pretty stable. I don't see any issues there.
What do I think about the scalability of the solution?
Scalability means upgrading to newer, better hardware.
From an end-user perspective, everyone in our organization is using it, as it's a perimeter device. If they have to access the internet, they use this firewall to allow that access. We have about 4,000 end-users and about 200,000 concurrent connections.
How are customer service and technical support?
Check Point's technical support is a seven out of 10. Sometimes it takes a lot of time to get the right people on TAC issues. And to buy time, they just use generic questions, which is really time-consuming and doesn't relate to the problem at all.
Which solution did I use previously and why did I switch?
For the infrastructure in question, we have always used Check Point firewalls.
I have worked with Cisco ASA. Cisco is more CLI oriented, whereas Check Point is more GUI oriented. With the GUI, it's easier to manage and administrate it. If the configuration becomes bigger and bigger, it is really easy to see things in the GUI versus a CLI.
The advantage of the CLI is that you can create scripts and execute them. But the disadvantage is that they become so lengthy that it becomes very difficult to manage.
How was the initial setup?
The initial setup is straightforward because it's a GUI interface. Even when it was upgraded, things didn't change in terms of the look and feel. It was still the same. There was no need to learn new things. It's easy for any administrator to learn new features.
On average, deployment takes one to two hours, including mounting and everything, from the physical work to moving the traffic there.
The issue is that we still need people to be onsite to do this because some tasks have to be done on the day. That means a technical person is required to do that work. We can't give it to any other person to do this because, until those particular steps are completed, things can't go any further.
We have six people, network admins, for deployment and maintenance because we have about 30 of firewalls.
What about the implementation team?
What was our ROI?
When we first started using them, we were just using them for basic functionality. Then we started using more features and introducing other components. For example, we had a different proxy server which we depended on. Once we got the Check Point, we could use the same device for multiple roles, which reduced the cost a lot. I would estimate our costs have been reduced by 30 percent.
What's my experience with pricing, setup cost, and licensing?
If you use the features then it's cost-effective. Otherwise, it's expensive.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.