We use the solution as a perimeter and OT demarcation firewall. As we are a large utility company with a distributed network, Check Point plays a vital role in terms of network segmentation. Specifically, we need identity-aware authentication to give us the best VPN compared to other players in the market.
Centralized management is a major plus of Check Point, which provides us with a better user experience.
We use it to safeguard our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios.
Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.
Check Point has a Purpose fit solution for our environment A lot of things need to be improved in Check Point NGFW.
For example, their support team isn't very efficient and useful. The solution itself isn't easy to learn, making it hard for support to provide solutions. The design makes it so pockets (specific teams) have to work together when there's an issue, which creates a mess. Also, Check Point lacks competitive capabilities like SD-WAN and CGM app integration.
Visibility needs improvement. For example, Fortinet shows all connected devices with IP addresses, MAC addresses, and sometimes usernames. More granular detail is crucial for security.
Support efficiency, visibility, and adding competitive capabilities are key areas for improvement.
The product offers a robust and intuitive experience, catering to the essential needs of users.
The Cleanup Rule's ability to discard unwanted traffic and the inclusion of default Autonomous Threat Prevention Profiles does simplify security measures; we're able to cater to various deployment scenarios.
I was impressed by how easy it was to activate blades and implement them on a security gateway.
The Smart Console's efficient user interface ensures that the changes to the policy are swiftly made. We're also able to maintain proper audit logs.
The solution requires improvements in the following areas:
- Having the Zone Alarm and the standalone endpoint VPN become compatible products.
- Having Smart Console in-place upgrades with IP/fingerprint retention
- A Mac version of the Smart Console.
- Streamlining of the endpoint solution and deployment options.
I've used the solution for ten years.
Technical support is excellent.
The initial setup was straightforward.
We implemented the solution through a vendor. They offered excellent support.