Try our new research platform with insights from 80,000+ expert users
Network Administrator at N S PHARMACY SDN.BHD.
Real User
Provides detailed reports and has good scalability
Pros and Cons
  • "The initial setup was very straightforward. You can customize it and change it as you need."
  • "Although they have it now, we don't have a license for it, and I think mobile device security should be a standard feature. I cannot control someone bringing their device to my network and what they do."

What is our primary use case?

We primarily use the solution as a firewall device and for our VPN.

What is most valuable?

It gives me very detailed reports. The endpoint solution for clients is wonderful.

What needs improvement?

We're looking at the endpoint because there are some smaller issues with internet connectivity within our country.

Although they have it now, we don't have a license for it, and I think mobile device security should be a standard feature. I cannot control someone bringing their device to my network and what they do.

For how long have I used the solution?

I've been using the solution for 6 months.
Buyer's Guide
Check Point NGFW
June 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.

What do I think about the stability of the solution?

Within the first four weeks, we had a few little issues with stability, consideration issues here and there. But the partner helped and gave direction that and now it's better. It's still under warranty so we are okay with it. We have about 250 users. We also have the administrative and the IT team in the company that manages different solutions.

What do I think about the scalability of the solution?

We are definitely planning to increase the scale, especially the endpoint. The cost in comparison with the brand new addition will be okay.

How are customer service and support?

Right now, the agreement we have is elaborate enterprise support. That means we are entitled to an engineer within 48 hours if we have issues that can't be resolved remotely. I've been satisfied with technical support so far.

Which solution did I use previously and why did I switch?

We were using the Sonicwall NSG 3400. It's a good appliance, but the major problem is they don't have competent technical partners in Nigeria. So all our support was via email, phone, and remote. It wasn't very good which is why we had to change it. Sometimes our network went down and we had to start calling so that we can call on the device. They needed to have someone in Nigeria that could assist. That's why we had to leave it.

How was the initial setup?

The initial setup was very straightforward. You can customize it and change it as you need. But the initial information is wonderful. Initial deployment took approximately two and a half days. Then, to complete everything took a week. Deployment took about 3-4 people.

What about the implementation team?

We had a partner. A representative of Check Point came and did the implementation.

What's my experience with pricing, setup cost, and licensing?

We pay a license fee on a three year basis. We have a three-year license. We pay $5,000-$6,000 a year.

What other advice do I have?

I would advise anyone to try Check Point.

I would rate this solution 7.5 out of 10. I think they should make their licensing simpler.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1821144 - PeerSpot reviewer
IT Security Officer at a tech services company with 1,001-5,000 employees
Real User
Detects malicious signatures, offers good log storage, and improved security posture
Pros and Cons
  • "Log storage gives us insights when required."
  • "Log queries are slow and take time to load."

What is our primary use case?

We are using Check Point Next-Generation Firewalls to protect and prevent our corporate network and infrastructure from attackers.  We are using NGFWs to filter unwanted and malicious traffic from the internet. Check Point NGFWs provide Layer 7 or application layer monitoring and detection. 

It is a stateless firewall which examines packets deeply and detects any malware or malicious URLs. It greatly protects our infrastructure by acting as a perimeter for our organization. 

Moreover, it has log ingestion and deep packet analysis capabilities. 

How has it helped my organization?

Check Point Next-Generation Firewalls improved the security posture of our organization by detecting, analyzing, and blocking unwanted traffic. It blocks any malicious files, processes and URLs due to having deep packet inspection and monitoring. 

Check Point firewalls not only detects anything malicious against it's signatures rather it analyses and monitors all processes running on different machines to detect anything wrong and then block those processes or URLs. 

Log storage gives us insights when required. 

What is most valuable?

Deep packet inspection, Layer 7, and application layer monitoring and detection are the great features of Check Point Next-Generation Firewalls. They greatly improve and protect an organization, its staff, and its resources. 

Check Point's SmartConsole is a great tool for admins as all firewalls can be centrally managed and all policies can be pushed as and when required by using SmartConsole. Log ingestion and threat hunting are also great functions in Check Point firewalls that enhances and improves a security posture. 

What needs improvement?

The SmartConsole to manage Checkpoint Next Generation Firewalls takes a long time to load and gets stuck sometimes. It could be due to a lot of rules and policies defined on the firewalls. However, SmartConsole software needs to be improved by having some more functions to make an admin's life easier. 

Log queries are slow and take time to load. 

Query functions need to be improved and should be quick to give the required information. 

There should be filters having drop-down options to use and select during log analysis. 

For how long have I used the solution?

I have been using Check Point firewalls for more than two years. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point NGFW
June 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.
reviewer1854897 - PeerSpot reviewer
Solutions Architect, Cyber Security & Networking team at Expert Systems Ltd
MSP
Well designed web-based dashboard good GUI and great load sharing
Pros and Cons
  • "The solution provides better stability and some interesting features such as the ease of throughput expansion."
  • "Check Point is not a cheap solution and it's always painful to see exactly how much we need to spend on this."

What is our primary use case?

We have proposed and deployed Check Point in a university environment that has multi-layer firewall protection for different zones, including DMZ, a server zone, Wi-Fi, a staff zone, a student hostel zone, guests, etc. Each zone is guarded by a firewall.

We need the NGFW to protect and secure the campus networks for more than 50,000 users. One of the key points is it is cost-effective and scalable to expand the throughput capacity. We expect the solution is possible to protect the networks for at least five to eight years without replacing the hardware investment. 

How has it helped my organization?

The solution provides better stability and some interesting features such as the ease of throughput expansion (or we can say the load sharing).

The scalability helps to offload the high traffic volume during school time. It also enhances redundancy. 

The load sharing capabilities using ClusterXL is possible to switch over the cluster mode to load sharing or Maestro. I also appreciate how easy it is to scale this product.

It is also great that the Check Point community (CheckMates portal) has a lot of helpful guidance. It helps us to work better and ease to find unfamiliar configurations on the new features, it is great for larger organizations as well as very small ones.

What is most valuable?

They offer very scalable solutions to extend computing resources if needed. We can expand the capacity in a very short time. 

The threat analysis reporting from their management console is very comprehensive and easy to use. 

Their web-based dashboard is well designed and offers much out-of-the-box reporting, and provides admins extensive customizations. 

In the operational GUI, Check Point provides rich customization methods to allow us to easily visualize/categorize objects in different colors. It makes operating the firewall much easier.

What needs improvement?

Under the same capacity requirements, Cheak Point is a bit higher than Fortinet yet much cheaper than Palo Alto. Although using Quantum Maestro to enhance scalability expansion is very helpful to cut down the total cost, it is still an issue for most of the company. Check Point is not a cheap solution and it's always painful to see exactly how much we need to spend on this. 

The upgrade process is not as easy as may be expected. If there is something that goes wrong, it causes the internet service to go down for the whole campus network. I am not happy with that situation since the upgrade process is a very common process. The outcome is not acceptable.

What do I think about the scalability of the solution?

It is scalable and very easy to expand the throughput and resources.

Check Point firewall provide a very cool feature using Quantum Maestro Hyperscale Orchestrator, it provides on-demand cloud-like scaling of our on-premises security gateways. By using Maestro, we can aggregate multiple mid-level Check Point appliances to provide a high throughput volume. It is very useful to scale up to 52 appliances. If we use other firewall solutions, they can only aggregate up to TWO firewalls with same model in clustering or purchase a more high end model firewall. 

For a long term planning, we can expand the throughput by reusing the existing Check Point hardware investment and adding new appliances to.


How was the initial setup?

The deployment is straightforward, however, the ongoing upgrades are not satisfactory.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. One of the Solutions Integrators offering Check Point, Palo Alto, and Fortinet solutions
PeerSpot user
reviewer1855902 - PeerSpot reviewer
Senior Consultant at Integrity360
Consultant
Great Smart View Tracker and smart dashboard with useful upgrade functionality
Pros and Cons
  • "The Smart Dashboard allows for rule creation and administration and management and is user-friendly."
  • "Error logs can be more specific."

What is our primary use case?

We use the solution for network security, perimeter security, DMZ, antibot, antivirus, endpoint protection, email security, sandblast, and DLP. The environment is a multi-environment and consists of multiple networks, segmented and managed by a management server. These firewalls protect the network, external and internal. 

We are also protecting several customers and it allows remote access connection from anywhere in a secure way.

There are also site-to-site VPNs with different customers, vendors, and cloud providers, using the highest security encryption algorithms.

How has it helped my organization?

The organization is more secure. These firewalls work as expected. We have a perimeter and network segmentation well defined and firewall features and blades like IPS, Identity awareness, antibot, antivirus, threat prevention, endpoint security, and DLP, all allow the organization to have most of the security components centralized which allows for easier maintenance and monitoring. 

In relation to the monitoring, Check Point has tools that allow the administrator to track the traffic, and identify threats, attacks, and also check the forensics to understand what happened in case of a breach and ensure it won't happen again.

What is most valuable?

The most valuable elements include:

Smart View Tracker: To check the traffic logs easily. This is the best logging tool for me so far. You can identify almost everything from the logs, using a smart view tracker.

Smart Dashboard: allows for rule creation and administration and management and is user-friendly. The administration allows you to copy and paste rules, move the order, and create objects, pretty easily. It is very handy.

CPUSE: A Smart way to upgrade firewall software versions. You can easily verify if you can upgrade to the desired version, download the right package and upgrade, and also check the status of the upgrade. It's a great tool.

What needs improvement?

Error logs can be more specific. Sometimes the error shows only a general error and the solution could be hard to find or difficult to apply. 

Documentation can be improved. It has been improved, however, when you search for errors, in relation to documentation and how to solve it, sometimes it is not that simple to find the right solution. Troubleshooting errors could be sometimes difficult and some tools are only available for the Check Point support team. 

The price is also a factor to take into account. Other competitors offer low prices in relation to Check Point and the executive team may opt for the cheapest vendor (if you have to compare to another good one yet note a cheaper price).

For how long have I used the solution?

I've used the solution for ten years.

What do I think about the scalability of the solution?

The solution offers good scalability.

How are customer service and support?

The solution offers good customer service and good support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have been using Check Point since the beginning.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

The solution is super stable.

What's my experience with pricing, setup cost, and licensing?

The pricing could be better, however, the vendor is excellent and I strongly recommend it.

Which other solutions did I evaluate?

I did not evaluate other options.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Consultant at KoçSistem
Real User
Lots of features, with high availability and helpful support
Pros and Cons
  • "If you want to share traffic loads to both cluster members you can use the active-active feature, if you don't want to share traffic loads you can prefer active standby."
  • "Check Point should add additional management choices."

What is our primary use case?

I'm a consultant and Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I deployed standalone, cluster, and two-layer firewalls. 

One of our customers has over 200 branch offices which were protected by Check Point SMB appliances. All these appliances are managed by CheckPoint SmartProvisioning. 

This customer has one cluster Check Point which secures server segments and one cluster Check Point which secures client segments.

How has it helped my organization?

Check Point firewall products include a lot of modules. Application Control, IPS, email security, mobile access, content awareness, URL filtering, antivirus, antibot, and DLP. Check Point meets our customer requirements at the perimeter with an all-in-one solution. 

For example, the IPS blade prevents attacks with updated signatures. URL filtering policy control customers users' internet activity. Antivirus and antibot blade controls malicious activity and files. Mobile access blades give customers to access their sites from anywhere securely.

What is most valuable?

There are a lot of features that I found valuable for our customers. 

For example, active-active and active-standby high availability features are very useful. 

If you want to share traffic loads to both cluster members you can use the active-active feature, if you don't want to share traffic loads you can prefer active standby. Your connections sync on both cluster members at both high availability choices. That way, your connections are never lost. 

Another valuable feature is performance improvement ability. With ClusterXL and CoreXL you can improve performance.

What needs improvement?

Check Point should add additional management choices. For example, Check Point doesn't fully have management support via browser. You need to use Check Point's SmartConsole for management. SmartConsole is .exe and it is supported only on the MS Windows platform. If you are using Linux or a Mac you can not manage Check Point. You should be able to use a virtual PC whose OS is Windows inside the Linux or MAC. Check Point states that this is a decision made for security reasons, however, certain management features can be done through the browser, yet not fully.

For how long have I used the solution?

I have been using the Check Point firewall for about 20 years.

How are customer service and support?

Check Point support center is very professional.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

What's my experience with pricing, setup cost, and licensing?

After buying the firewall, you can use Check Point for a lifetime, however, it is a subscription base for content security features.

Which other solutions did I evaluate?

We also evaluated Fortinet and Cisco.

What other advice do I have?

If you are looking for a firewall appliance that has a lot of security features, easy installation, and configuration, Check Point firewall products are the best for you.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. KocSistem
PeerSpot user
General Manager at Qhawariy
Real User
Stable and scalable with an easy setup and configuration
Pros and Cons
  • "The initial setup is easy."
  • "The interface could be better."

What is our primary use case?

We are using the new version of Check Point NGFW. 

We use the solution for web page protection to provide the security service which is lacking in Bolivia, a poverty ridden country. 

What is most valuable?

I like the facility of the product configuration. The ease with which the solution can be put into production makes it easy for my employers and for me to provide client support. 

What needs improvement?

The interface could be better. There is much equipment that is involved in the monitoring of many clients in a single interface. 

With other platforms, such as WatchGuard, it is very simple to manage four, five or six of these. We are talking about a lot of clients. The platforms for doing monitoring should be addressed. 

What do I think about the stability of the solution?

The solution boasts good stability. 

What do I think about the scalability of the solution?

The solution boasts good scalability. 

How are customer service and support?

I have not had need to make use of technical support. 

How was the initial setup?

The initial setup is easy. 

What about the implementation team?

When it comes to the deployment and maintenance, there are two people involved, one for the deployment and the other for monitoring, consisting of an engineer and a technician. 

What other advice do I have?

I feel that the clients are very satisfied with the product.

I don't have any particular advice when it comes to the deployment process. This will depend on the client's needs. 

I rate Check Point NGFW as an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Senior Network Administrator at a financial services firm with 1,001-5,000 employees
Real User
Beneficial management features and scalable
Pros and Cons
  • "The separate management feature of Check Point NGFW is very convenient."
  • "The technical support is really poor. We have to wait for approximately 48 hours sometimes for a simple solution."

What is our primary use case?

We are using Check Point NGFW as a firewall for our organization. All the internet traffic goes through it.

What is most valuable?

The separate management feature of Check Point NGFW is very convenient.

For how long have I used the solution?

I have been Check Point NGFW for approximately five years.

What do I think about the stability of the solution?

The solution is stable when it is running incapacity, if it goes beyond it can be not stable. There could be more stability by having more ports or CPU power.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

The technical support is really poor. We have to wait for approximately 48 hours sometimes for a simple solution.

How was the initial setup?

The installation is not straightforward.

What about the implementation team?

We needed help from the Check Point expert experts because we deployed it in the HA. It's a bit different from the other firewall vendors. You need a Check Point expert to deploy it initially.

We have a five-person technical team for the maintenance of the solution. We use managers, admins, engineers, and developers.

What other advice do I have?

I rate Check Point NGFW an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Engineer at CENACE
Real User
Easy to set up, stable and scalable
Pros and Cons
  • "Configuration and deploying are easy."
  • "The price of this product could be improved."

What is our primary use case?

My primary use case of this solution is for the data center in the perimeter security. We configure all of our security features like anti-boot, antivirus, and filtering.

What is most valuable?

I think the most valuable feature is that the application and configuration were easy for us. When we need to do some work with the networks, configuration and deploying are easy - if I want to search for information, it is easy in the Check Point platform.

What needs improvement?

I think the price of this product could be improved - other solutions are cheaper in comparison. In the next release, I would like to be able to perform sandboxing to check email attachments and information sent through the cloud for viruses.

What do I think about the stability of the solution?

I think this solution is stable.

What do I think about the scalability of the solution?

My impression is that the solution is scalable.

What about the implementation team?

I implemented using a vendor team, whose performance was good.

Which other solutions did I evaluate?

I considered using Cisco before deciding on Check Point.

What other advice do I have?

Check Point is easy for the configuration user. I would rate this solution as eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.