My main use case for Check Point NGFW is using it as a next gen firewall for perimeter security, for branch connectivity, VPN access, and deep packet inspection of north south traffic. That is the main use case.
Technical Specialist at Softcell Technologies Limited
Granular application management and robust threat prevention bolster security operations
Pros and Cons
- "The product's ease of use is a significant advantage, and the interface is very intuitive."
- "The product's ease of use is a significant advantage, and the interface is very intuitive."
- "The product's ease of use is a significant advantage, and the interface is very intuitive."
- "The product's ease of use is a significant advantage, and the interface is very intuitive."
What is our primary use case?
How has it helped my organization?
Check Point NGFW has positively impacted my organization, which has around two thousand employees, by keeping us protected from cyber threats. It's challenging nowadays, but with Check Point NGFW deployed for perimeter security, we effectively block unwanted or malicious intrusions, allowing all organizational users to stay safe while performing their tasks without disruption. The positive impact is evident as users remain focused on their work, which contributes to improving our organizational economic growth.
What is most valuable?
The best features Check Point NGFW offers include application control, which makes it granular control for managing applications. There are thousands of applications in the Check Point repository, making it easy to write a policy according to requirements based on application needs. Another feature such as URL filtering works efficiently, allowing us to categorize websites for user access. We can create allow and deny policies based on organizational needs. Additionally, there is IPS for preventing threats, which can take action against malware or unwanted traffic trying to enter the network. This keeps us safe and protected against cyber threats.
Check Point NGFW also has an antivirus capability and allows identity-based policies with easy integration of LDAP or two-factor authentication methods. HTTPS inspection stands out as Check Point NGFW excels in identifying threats because it inspects all traffic, including encrypted traffic, for malicious activities. Check Point has good hardware capabilities to accelerate and manage overall traffic load, accommodating heavy loads easily. SmartConsole centralizes firewall management for better control over multiple firewalls and policies.
What needs improvement?
For improvements, I believe integrating AI-driven features for bulk operations or complicated tasks would be beneficial for Check Point NGFW. A feature that allows users to prompt the AI for backend tasks would save operational teams time and streamline processes. Additionally, improving the dashboards for better visibility and metrics regarding attack traffic would also benefit the monitoring team.
Buyer's Guide
Check Point NGFW
April 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,471 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point NGFW for two and a half years.
What do I think about the stability of the solution?
I rate the overall stability of Check Point NGFW at a ten out of nine because, while it performs exceptionally, SmartConsole needs improvement regarding performance. Sometimes it takes time to install policies, but I believe future enhancements will improve this aspect.
Overall, I would rate Check Point NGFW as a nine for its good performance, leaving one point for future improvements, particularly in SmartConsole performance.
What do I think about the scalability of the solution?
The scalability of Check Point NGFW is good. We can utilize its entire feature set, including URL filtering, application control, IPS, and threat intelligence. Integrations with LDAP and other two-factor authentication solutions are easily accomplished, adding to its good integration perspective.
How are customer service and support?
Check Point NGFW's customer support is very good. Occasionally, responses can be delayed, but I understand there are circumstances on their side, which is acceptable. I hope their support will improve in the future.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
My experience with Check Point NGFW's pricing reveals it is a bit higher than other vendors. However, considering the security and features Check Point NGFW offers, it's justified. Licensing can be complex and requires careful planning due to add-on licenses, so it's essential to plan what licenses our organization needs accordingly. The initial learning curve for new administrators can be challenging since it is not very user-friendly. However, for those who understand the product, handling all tasks becomes easier. For beginners, it can be complicated to grasp the Check Point NGFW architecture, and advanced reporting could be improved with better visuals or dashboards.
What other advice do I have?
I recommend others looking into using Check Point NGFW to utilize all available licensing for application control, URL filtering, and IPS. It's essential to enable HTTPS inspection to understand its impact on firewall performance and plan accordingly. If the hardware is sufficient, higher models should handle heavy loads effortlessly. I suggest exploring SmartConsole features, as there are many available. Although not everything can be utilized, maximizing its capabilities is beneficial. Additionally, the inspection settings for IPS and TCP/UDP protocols should be adjusted according to best practices to ensure smooth operations without blocking legitimate traffic due to strict configurations. Overall, I rate Check Point NGFW a 9 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 11, 2025
Flag as inappropriate
Nice portal, good security, and great dashboards
Pros and Cons
- "The solution is easy to administer thanks to its dashboards. The monitoring is really useful."
- "Currently, some prices are very expensive."
What is our primary use case?
We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop.
Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.
How has it helped my organization?
Thanks to Check Point, we managed to carry out a better security implementation. By placing one in a workshop, we managed to solve issues with attacks and malware.
The solution is easy to administer thanks to its dashboards. The monitoring is really useful.
What is most valuable?
The most valuable aspects include:
What needs improvement?
The best improvements to be considered are:
- Improvements in the time and attention given to solutions for generated cases.
- Licensing that is more comfortable and affordable. Currently, some prices are very expensive.
- In terms of language in the application, they could better facilitate the handling of others.
For how long have I used the solution?
This is an excellent product of the new generation, administered in the Infinity Portal. We have used the product for at least two years.
Which solution did I use previously and why did I switch?
Previously, we had not carried out verifications of other devices.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point NGFW
April 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,471 professionals have used our research since 2012.
IT Security Officer at a tech services company with 1,001-5,000 employees
Detects malicious signatures, offers good log storage, and improved security posture
Pros and Cons
- "Log storage gives us insights when required."
- "Log queries are slow and take time to load."
What is our primary use case?
We are using Check Point Next-Generation Firewalls to protect and prevent our corporate network and infrastructure from attackers. We are using NGFWs to filter unwanted and malicious traffic from the internet. Check Point NGFWs provide Layer 7 or application layer monitoring and detection.
It is a stateless firewall which examines packets deeply and detects any malware or malicious URLs. It greatly protects our infrastructure by acting as a perimeter for our organization.
Moreover, it has log ingestion and deep packet analysis capabilities.
How has it helped my organization?
Check Point Next-Generation Firewalls improved the security posture of our organization by detecting, analyzing, and blocking unwanted traffic. It blocks any malicious files, processes and URLs due to having deep packet inspection and monitoring.
Check Point firewalls not only detects anything malicious against it's signatures rather it analyses and monitors all processes running on different machines to detect anything wrong and then block those processes or URLs.
Log storage gives us insights when required.
What is most valuable?
Deep packet inspection, Layer 7, and application layer monitoring and detection are the great features of Check Point Next-Generation Firewalls. They greatly improve and protect an organization, its staff, and its resources.
Check Point's SmartConsole is a great tool for admins as all firewalls can be centrally managed and all policies can be pushed as and when required by using SmartConsole. Log ingestion and threat hunting are also great functions in Check Point firewalls that enhances and improves a security posture.
What needs improvement?
The SmartConsole to manage Checkpoint Next Generation Firewalls takes a long time to load and gets stuck sometimes. It could be due to a lot of rules and policies defined on the firewalls. However, SmartConsole software needs to be improved by having some more functions to make an admin's life easier.
Log queries are slow and take time to load.
Query functions need to be improved and should be quick to give the required information.
There should be filters having drop-down options to use and select during log analysis.
For how long have I used the solution?
I have been using Check Point firewalls for more than two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Project Management and Deployment Team Leader at Sefisa
Great security features with helpful support and useful integration capabilities
Pros and Cons
- "In addition to the different security features that Check Point security solutions have, their integration with other technologies makes the security environment a complete security type."
- "Check Point could do better to include acceleration technologies like SD-WAN in an integrated or embedded way to provide these new features that Check Point never had and is of great importance in the market."
What is our primary use case?
We have a very robust implementation of firewalls for a central site, a contingency site, and five agencies, all connected by MPLS. In each perimeter firewall, we apply the security features of FW, IPS, AV, and AB. Additionally, we have a VPN concentrator for VPN S2S and C2S.
How has it helped my organization?
Over time, Check Point's solutions have had fewer security breaches than their competitors, which is why they remain in high categories and quadrants, as they are a very robust technology. As pioneers in information security, Check Point has been innovating year after year in information security.
Since we implemented this architecture in our client, we have not had any security breach exploited and the organization maintains communication with its different sites through MPLS and VPN to secure and encrypt the traffic that passes through said connection.
What is most valuable?
In addition to the different security features that Check Point security solutions have, their integration with other technologies makes the security environment a complete security type.
Apart from the technological and innovative solution, a point in favor of Check Point is the support provided by the manufacturer, since over time, we have not had any case that is not resolved, they have a good escalation process and highly qualified staff.
The process of opening a case has different options that are convenient.
What needs improvement?
Check Point could do better to include acceleration technologies like SD-WAN in an integrated or embedded way to provide these new features that Check Point never had and is of great importance in the market.
Its competitors have this SD-WAN technology, if it were not for the fact that Check Point has been more stable historically, this value would weigh negatively for Check Point when choosing a solution.
If Check Point includes this feature, they will be able to cover those architectures where traffic between sites must be protected and accelerated.
For how long have I used the solution?
I have been using Check Point for ten years. It is a very mature and robust technology. R81 is a very stable version and always has great security features.
How are customer service and support?
I consider that they have good support engineers at each level of escalation, according to the criticality of the issue.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I do use other technologies, however, Check Point is historically more stable for me, as they have had fewer exploitable security breaches.
What's my experience with pricing, setup cost, and licensing?
Check Point has a good cost-benefit ratio.
Which other solutions did I evaluate?
We also evaluated Fortinet, Palo Alto, and Watchguard.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
Great for content filtering and enabling anti-bots and IPS enabled security
Pros and Cons
- "The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution."
- "Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes."
What is our primary use case?
We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.
The solution addresses the Security requirements at Perimeter Layer including:
- Network IPS
- Application Control
- IPSEC VPN
- SSL VPN.
- Proxy
It was required to enable IPSEC VPN between our vendors across the world
We got positive responses on Check Point Firewalls from our vendors as well.
Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.
How has it helped my organization?
We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.
This solution addressed most of our needs but required multiple license subscriptions.
Below are the few Business use cases we achieved through Check Point NGFW:
- SSL VPN with Security Posture Assessment
- SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
- Content Filtering (Identity Awareness and DLP)
- Forward Proxy with Web and Application Control
- Enabling Anti-Bots and IPS
What is most valuable?
The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.
Anti-Bots and IPS enabled security on the network traffic.
Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.
The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.
What needs improvement?
It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.
We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B
Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.
We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.
Please concentrate on local services enablement for faster resolutions.
For how long have I used the solution?
We have been using this solution since July 2020.
What do I think about the stability of the solution?
Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.
What do I think about the scalability of the solution?
The solution is scalable in terms of enabling the features and deploying management servers.
How are customer service and support?
We would recommend they have regular feedback sessions with customers.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used another firewall that enables basic security features with lot of limitations.
How was the initial setup?
We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.
What about the implementation team?
Our In-house team handled the implementation.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.
Which other solutions did I evaluate?
We evaluated Palo Alto and FortiGate.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Firewall Administrator at a tech services company with 1,001-5,000 employees
Centralized management makes it easy to scale and the GUI makes it easy to use
Pros and Cons
- "The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily."
- "The frequency of the antivirus updates which we get for Check Point firewalls should increase. They should be of good quality compared to the competitive firewalls on the market. They should give us stable antivirus signatures. That is an area in which they can improve."
What is our primary use case?
We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.
What is most valuable?
The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily.
What needs improvement?
The frequency of the antivirus updates which we get for Check Point firewalls should increase. They should be of good quality compared to the competitive firewalls on the market. They should give us stable antivirus signatures. That is an area in which they can improve.
For how long have I used the solution?
I have been using Check Point's Next Generation Firewalls for the last three-and-a-half years.
What do I think about the stability of the solution?
These firewalls are very stable and, apart from the antivirus issue which I mentioned, everything is stable in them. The best thing is that they are the most advanced firewall on the market.
What do I think about the scalability of the solution?
Per my experience, it is very easy to scale these firewalls, because they are combined with the central management point. It is very easy to push the same configuration to different firewalls at the same time. It does not take much time to extend usage.
We use them throughout our organization. Currently we have used them for around 50 percent of our needs and there is definitely a room to grow. In the future we will definitely try to increase usage, if it is required.
How are customer service and technical support?
We have had a good experience with the Check Point support guys. The solutions they provide are very straightforward and are provided quickly.
Which solution did I use previously and why did I switch?
I used Palo Alto firewalls. Compared to Palo Alto we are happier with the Check Point Firewall features. Key differences are the ease of operating Check Point firewalls and the use of Linux, as we are all trained in Linux. It is easier for us to work on the ELA of Check Point firewalls. And Check Point's support is good.
Check Point is the best firewall we have found for our organization so we went with it.
How was the initial setup?
In our company we do setup of Check Point firewalls very frequently because we are a growing company and we are required to do them on a fresh basis for our new branches.
The initial setup for these firewalls is straightforward. There's nothing complex about Check Point firewalls. They are easy to install and configure. We have cloud-based VM firewalls. We configure them in our environment. It is easy to access them and it is also easy to implement the changes on them.
Deployment time depends on the condition and the space of the organization. In our case, it requires three to six months for the setup phase. We have the same implementation strategy for all our branches, which is very simple. It is a three-level hierarchy which is recommended by Check Point. We use the SmartConsole, we use the Security Gateway, and we use the Security Management Server.
In my organization there are six people who have the access to the Check Point firewalls. Two of them are network administrators and four are managers.
What was our ROI?
We are happy with the return on investment from the Check Point firewalls. We are happy with the features and with the protection they provide us.
What's my experience with pricing, setup cost, and licensing?
The licensing part is easy for Check Point firewalls. You just purchase the license and install it on the firewall. The pricing is a bit high, but obviously it gives you advanced features. If you want to buy the best thing on the market, you have to pay extra money.
What other advice do I have?
When implementing the product, follow the recommendations which Check Point provides. Follow the backup for the firewall so that in case of an issue, you have a secondary firewall active.
The biggest lesson I have learned is that there is a scope of improvement. Companies that are improving and providing updates frequently are growing more. In addition, improving support is a very key part of things. Check Point rates well on all these points.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Solutions Lead at a tech services company with 1,001-5,000 employees
We are seeing less traffic going to the server, improving server performance
Pros and Cons
- "My favorite feature is the UTM piece and that was the main reason we bought it. It helps us to fine tune the network."
- "When I was creating the VPN on it and the client side through the portal, that feature was very annoying. I could not use it. It was much more usable after downloading it to the laptop. That was very good compared to using it directly from the browser."
What is our primary use case?
It's an on-prem deployment where we use it to protect our client and end-users who are working with the internet, and to protect their servers from external access. They have about 100 users and two servers.
How has it helped my organization?
When we did not have SSO, we had problems related to attacks compromising our firewall. That has been mitigated. We have the traffic going through the firewall to the server, so those types of things have really improved. We are seeing less traffic going to the server. When there was direct access to it, there was more and more traffic going to our server. So it has improved our server performance.
What is most valuable?
My favorite feature is the UTM piece and that was the main reason we bought it. It helps us to fine tune the network. We use it to block certain websites, to block access to particular locations, such as in Singapore or say Malaysia, where we have offices. We keep the previous device updated and, based on that, we also have static MAC address binding.
We also use the VPN services. The VPN features are mostly for our cloud connectivity and for our remote users to have local server access.
What needs improvement?
When I was creating the VPN on it and the client side through the portal, that feature was very annoying. I could not use it. It was much more usable after downloading it to the laptop. That was very good compared to using it directly from the browser.
For how long have I used the solution?
I have been using Check Point NGFW for almost two-and-a-half years.
What do I think about the stability of the solution?
It's a stable solution. In the time I have been using this product, I have hardly seen anything break.
What do I think about the scalability of the solution?
In terms of scalability, they have products that can fit into the environment. It's a very scalable solution. For our requirements, it fits very well. You can go with whatever kind of setup you want: Active-Passive, Active-Active. Check Point is very easy. Their solution is ready for our market; it's very well suited. Wherever we want to go, Check Point can provide a solution.
Currently, we are using somewhere around 50 to 60 percent of the box's capacity.
How are customer service and technical support?
Sometimes, when I have gotten stuck, I have reached out to support and it's okay. They have helped me very quickly.
Which solution did I use previously and why did I switch?
We did not have a previous solution. We went directly with Check Point. We liked the features provided by Check Point and we went for it.
How was the initial setup?
The setup is not complex. It's easy to deploy. The documentation provided is very good. Deployment takes me two to three days. The hardware takes one-and-a-half days and then I get all the features up and running.
We have a standard implementation strategy. We have a checklist. We plan it out. Then we go into the field for the deployment. We have one dedicated engineer for deployment, and I also check it on a regular basis. The two of us are also the ones who manage the solution.
What's my experience with pricing, setup cost, and licensing?
We have to consider things, cost-wise, when we are expanding into other locations. We don't have the budget to use it in other platforms. We have some servers that we deploy in AWS and other locations. But instead of going with Check Point, we go with other vendors to fit into the budget.
Check Point is really costly. When it comes to the Indian market, where we are located, we always consider budget solutions. So this is an area where Check Point could use some improvement.
In addition to the standard fees, support is an added expense.
What other advice do I have?
The biggest lesson learned from using this solution is in terms of security. It is a really good product. I don't think there is anything missing from the Check Point firewalls. The features provided by the company are very good and provide what we need.
It's a very good security product, as long as you have the budget. It provides modern security and the architecture Check Point provides is good. And the application side will really help any size of business to deal with traffic based on the application.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer:
Senior Consultant at Integrity360
Great Smart View Tracker and smart dashboard with useful upgrade functionality
Pros and Cons
- "The Smart Dashboard allows for rule creation and administration and management and is user-friendly."
- "Error logs can be more specific."
What is our primary use case?
We use the solution for network security, perimeter security, DMZ, antibot, antivirus, endpoint protection, email security, sandblast, and DLP. The environment is a multi-environment and consists of multiple networks, segmented and managed by a management server. These firewalls protect the network, external and internal.
We are also protecting several customers and it allows remote access connection from anywhere in a secure way.
There are also site-to-site VPNs with different customers, vendors, and cloud providers, using the highest security encryption algorithms.
How has it helped my organization?
The organization is more secure. These firewalls work as expected. We have a perimeter and network segmentation well defined and firewall features and blades like IPS, Identity awareness, antibot, antivirus, threat prevention, endpoint security, and DLP, all allow the organization to have most of the security components centralized which allows for easier maintenance and monitoring.
In relation to the monitoring, Check Point has tools that allow the administrator to track the traffic, and identify threats, attacks, and also check the forensics to understand what happened in case of a breach and ensure it won't happen again.
What is most valuable?
The most valuable elements include:
Smart View Tracker: To check the traffic logs easily. This is the best logging tool for me so far. You can identify almost everything from the logs, using a smart view tracker.
Smart Dashboard: allows for rule creation and administration and management and is user-friendly. The administration allows you to copy and paste rules, move the order, and create objects, pretty easily. It is very handy.
CPUSE: A Smart way to upgrade firewall software versions. You can easily verify if you can upgrade to the desired version, download the right package and upgrade, and also check the status of the upgrade. It's a great tool.
What needs improvement?
Error logs can be more specific. Sometimes the error shows only a general error and the solution could be hard to find or difficult to apply.
Documentation can be improved. It has been improved, however, when you search for errors, in relation to documentation and how to solve it, sometimes it is not that simple to find the right solution. Troubleshooting errors could be sometimes difficult and some tools are only available for the Check Point support team.
The price is also a factor to take into account. Other competitors offer low prices in relation to Check Point and the executive team may opt for the cheapest vendor (if you have to compare to another good one yet note a cheaper price).
For how long have I used the solution?
I've used the solution for ten years.
What do I think about the scalability of the solution?
The solution offers good scalability.
How are customer service and support?
The solution offers good customer service and good support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been using Check Point since the beginning.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
The solution is super stable.
What's my experience with pricing, setup cost, and licensing?
The pricing could be better, however, the vendor is excellent and I strongly recommend it.
Which other solutions did I evaluate?
I did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Meraki MX
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?