No more typing reviews! Try our Samantha, our new voice AI agent.
MURALI NIDAMANURI - PeerSpot reviewer
Managing Director at a manufacturing company with 10,001+ employees
Reseller
Top 5Leaderboard
Nov 13, 2023
Robust network protection with advanced threat prevention, comprehensive multi-layered security, and seamless stability
Pros and Cons
  • "It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats."
  • "There is room for enhancement in the support system in India."

What is our primary use case?

We use it for safeguarding our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios. Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.

What is most valuable?

It provides a comprehensive and scalable security solution. With features like nanosecurity, cloud integration, and multi-domain management, they address the diverse security needs of businesses, from small enterprises to large corporations. It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats.  It boasts an Infinity architecture, offering a multitude of features tailored to enterprise needs. The integration with AWS and Google Cloud, safeguarding cloud servers and networks. The Multi-Domain Management feature enables centralized control across on-premises and cloud environments, streamlining security management.

What needs improvement?

There is room for enhancement in the support system in India. Given the burgeoning market and the growing reliance on security solutions, focusing on strengthening support and implementation infrastructure would be beneficial. This could involve increased training programs to equip professionals with the necessary skills to understand and effectively implement Check Point technologies. Its scalability capabilities should be improved.

What do I think about the stability of the solution?

It's an exceptionally stable tool. I would rate it nine out of ten.

Buyer's Guide
Check Point Quantum Force (NGFW)
March 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Scaling up is quite restricted, and the scalability needs improvement. It should be a multi-tiered and robust solution. Currently, there is a gap in the ability to seamlessly scale within the same series. I would rate it seven out of ten.

How are customer service and support?

Technical support in India is lacking, and there's a clear need for improvement. There's a high reliance on third-party support, which needs to be addressed. The current rating would be around five on a scale of one to ten.

What about the implementation team?

The implementation process is generally straightforward and basic, taking around one to one and a half hours. However, if there's a need for the creation of numerous VLANs and policies, it might extend over several days.

What's my experience with pricing, setup cost, and licensing?

It comes with a significant price. The cost of the six thousand six hundred models was approximately thirty-eight lakhs. Although the cost may be higher, the reliability and functionality it offers are well worth the investment. I would rate it ten out of ten.

What other advice do I have?

I consider it a top leader in security, and I highly recommend it. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
PeerSpot user
reviewer98265120 - PeerSpot reviewer
Senior Technical Consultant at CDW
MSP
Nov 1, 2023
Improves environments, has helpful support, and offer great compute power
Pros and Cons
  • "The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware."
  • "We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration."

What is our primary use case?

The customer purchased Check Point 6200 Firewalls to replace their aging Cisco ASA firewalls on the perimeter of their sites. The Cisco Firewalls must be replaced due to insufficient capacity.

It is envisioned that the initial migration will be a direct replica of the ASA configuration, with the client expanding the solution post-migration, with Check Point NGFW features.

This project consisted of the following deliverables:
• Rule base is migrated like for like, in which ASA Firewall zone-based rules will be converted to Check Point Parent/Child layered rules.
• Firewall zones to be imported and reviewed post migration by client.
• NAT rules will be migrated “as-is”.
• Geo-location rules from FTD will be honored and mapped into Check Point.
• Client-based blacklisting will be migrated into the solution, using external feeds via URL.
• A single IPS profile consisting of a clone of the vendor's “out-of-box” balanced profile (optimized).
• 1X site-to-site VPN.
• Integration into Client’s Cisco ISE solution for RADIUS-based admin authentication.
• NGFW licensing and blades to be installed on firewall devices, to allow features to be enabled in the future and expand the solution.

How has it helped my organization?

The Client wishes for the ASA firewalls to be replaced with a Check Point systems solution, which consists of 6200 Plus Appliances. 

The initial requirement was to migrate the configuration in an “as-is” state, with the necessary licensing purchased and installed to enable expansion of the solution with next-generation feature sets in the future.

The solution was able to meet and exceed the client's requirements thereby improving the client's environment.

The management server is software-based.

Firewalls and licensing include:
• FW
• IPS

The solution provides a single pane of glass management of rules/logging.

The solution supports IPsec tunnels FOR 1X IPsec VPNs.

The solution integrates with the client’s Cisco ISE RADIUS solution for administrative access.

What is most valuable?

The compute power of the appliance is great. The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware.

What needs improvement?

We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration.

Check Point configuration options can be very enormous and overwhelming.
Check Point comes with a very lean learning curve even though they offer a robust knowledge base. 

A lot of configuration cannot be accomplished via the web interface or the smart dashboard software and must be done manually via the command line interface.

I'd like to see some built-in automation for the firewall alerts/events to trigger an automated response or recovery.

For how long have I used the solution?

I've used the solution for three years.

What do I think about the stability of the solution?

The solution is stable with frequent version and management updates.

What do I think about the scalability of the solution?

The solution is highly scalable and expandable.

How are customer service and support?

The solution offers great customer support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used a different solution and needed more processing power and functionality which this had compared to industry competitors.

How was the initial setup?

The setup was straightforward yet third-party device migration contained a lot of manual configuration conversions.

What about the implementation team?

I implemented this myself.

What's my experience with pricing, setup cost, and licensing?

Pricing can be relatively more expensive when compared to industry peers, however, the functionality makes up for the price difference.

Which other solutions did I evaluate?

We also evaluated:

What other advice do I have?

This is a great overall solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Check point Partner
PeerSpot user
Buyer's Guide
Check Point Quantum Force (NGFW)
March 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.
Saurabh Lahoti - PeerSpot reviewer
Network Engineer at Worldline Global
Real User
Oct 25, 2023
Intuitive with a user-friendly management interface and is accessible to non-technical staff
Pros and Cons
  • "Check Point firewalls have significantly improved our ability to detect and prevent threats."
  • "It requires enhanced automation tools for regulatory compliance to ease the burden of compliance reporting and auditing."

What is our primary use case?

The implementation of Check Point firewalls has been a transformative experience for our organization. It has significantly improved our cybersecurity posture, enabling us to detect and prevent threats more effectively, streamline management, and stay agile in the face of evolving security challenges. 

With Check Point, we are not just securing our data, we are also protecting our brand and reputation. The value they bring to our organization is immeasurable, making them an essential component of our overall cybersecurity strategy.

How has it helped my organization?

In today's ever-evolving digital landscape, cybersecurity is paramount for any organization. For our company, the implementation of Check Point firewalls has proven to be a pivotal moment in our ongoing quest to bolster our cybersecurity defenses. These firewalls have not only improved our security measures but have also positively impacted our overall business operations.

In our industry, adhering to stringent compliance regulations is paramount. Check Point firewalls help us ensure compliance with industry-specific regulations and standards, such as HIPAA, GDPR, or PCI DSS. This compliance assurance has eased the audit process and instilled trust among our clients.

What is most valuable?

Check Point firewalls have significantly improved our ability to detect and prevent threats. The robust threat intelligence capabilities, coupled with real-time monitoring, have allowed us to swiftly respond to potential security breaches. As a result, we have experienced a noticeable decrease in security incidents and data breaches, which ultimately translates into cost savings and a bolstered reputation.

As our organization grows, so does the volume of data we need to protect. Check Point firewalls have proved scalable and can handle increased traffic and the addition of new services without compromising performance. This scalability ensures that our security measures are always aligned with our business growth.

One of the standout features of Check Point firewalls is their user-friendly management interface. This intuitive platform has streamlined firewall management, making it accessible to both our in-house IT team and non-technical staff. This has resulted in a more efficient use of resources and time, allowing our IT personnel to focus on other critical tasks.

What needs improvement?

The product needs comprehensive reporting and analytics capabilities to help organizations gain insights into their security posture and demonstrate compliance to stakeholders.

It requires enhanced automation tools for regulatory compliance to ease the burden of compliance reporting and auditing.

The solution needs to tighten security by facilitating easy integration with MFA solutions to enhance user authentication.

It needs to integrate automation and orchestration capabilities to streamline incident response and automate routine security tasks, reducing the workload on security teams.

As containerization and microservices become more prevalent, it needs to provide security solutions that protect these modern application architectures effectively. Features like runtime protection and security scanning for containers can be beneficial.

For how long have I used the solution?

I've used the solution for almost five years now.

What do I think about the stability of the solution?

Check Point firewalls are quite robust and resilient.

What do I think about the scalability of the solution?

Check Point firewalls have proved scalable and can handle increased traffic and the addition of new services without compromising performance.

How are customer service and support?

The technical support is recommended. I'd give them an A++++.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution. 

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

We deployed the solution using Check Point's PS Support. Their team is highly experienced and professional.

What was our ROI?

It's worth the cost.

What's my experience with pricing, setup cost, and licensing?

Initially, the cost of the investment might seem high compared to other vendors. However, in the long run, it might prove to be economical and cost-efficient.

Which other solutions did I evaluate?

I also evaluated Fortinet and Cisco ASA.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Bharath Kumar Gajula - PeerSpot reviewer
Network Security Architect at a consultancy with 10,001+ employees
Real User
Oct 20, 2023
A highly stable solution that provides security and has firmware with very few vulnerabilities
Pros and Cons
  • "The tool has solid firmware with very few vulnerabilities."
  • "The tool must improve its support."

What is our primary use case?

The solution is our main firewall. It protects our perimeter.

What is most valuable?

The tool has solid firmware with very few vulnerabilities. We don't need to upgrade it for vulnerabilities. It is rare when compared to the competitors. The product’s performance is good. My organization chose the product because it is stable and provides a very good Software Blade.

What needs improvement?

The tool must improve its support. The support provided by partners gets expensive.

For how long have I used the solution?

I have been using the solution for around six years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The solution protects the entire perimeter. Every user passes through the firewall. It is used daily. We have around eight administrators. The solution requires very little maintenance.

How was the initial setup?

The initial setup was easy.

What's my experience with pricing, setup cost, and licensing?

The solution is expensive. A medium data center would cost around $17,000 per year for a medium enterprise.

Which other solutions did I evaluate?

Except for Palo Alto, Check Point is good compared to its competitors. Cisco ASA lacks features.

What other advice do I have?

It is a good product. There are other competitors. Check Point NGFW is easy to deploy, manage, implement, and troubleshoot. The operation is pretty simple. Even a few operations people can run it very well. It is pretty much stable. We need to safeguard the data of our organization very well. Check Point NGFW is a leading solution provider. Security products must not have many vulnerabilities. Overall, I rate the product a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS
Real User
Aug 2, 2022
Smart, simple, and user-friendly
Pros and Cons
  • "The solution offers a good GUI."
  • "We always believed and saw that the money we spent on Check Point was not in vain."
  • "The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions."
  • "If you are working within a big organization, you may have some CPU and memory utilization problems."

What is our primary use case?

We are using physical appliances along with some VSX's in our network. We mostly use firewall only (due to high traffic usage). We are using CP NGFW to protect the company from the internet and also provide security while we are connecting to the internet.  

We have physical clusters that we manage via our company's external connections through S2S. We are managing our core and client networks with separate clusters. Applying security rules and providing NAT when we need it. We are also using CP in our DRC environment to provide SRC and DST NAT with VSX to provide access to machines that have the same IP addresses.

How has it helped my organization?

Back when we had a different brand of firewalls, we were having trouble managing all of them separately. With Check Point's HA capability, we merged all of our Check Point firewall management. With this, we can apply a viable DRC solution that our company needs and also manage, view logs, and administer all of the components together.

With the capable appliances, we don't experience any CPU and Memory utilization most of the time. With the help of new versions, Check Point is moving forward. We hope the upcoming version will provide hyper flow, and this will solve our elephant flow problem.

What is most valuable?

The solution offers a good GUI. It is easy to use, smart, simple, and user-friendly.

The client VPN and S2S VPN capabilities are great. Check Point's mobile access provides us with flexibility. We don't have a single point of failure regarding the VPN access points anymore.

We can use Check Point NGFW physically, virtually (with Check Point VSX), and on the cloud with CloudGuard. We have most of the features available even within these different environments.

We can apply SAM Rules (without installation needs), and Custom Intelligence Feeds.

It has good API support and provides value when you need it. 

What needs improvement?

The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions. Other vendors provide this, including Palo Alto). We are in a big organization now, and we need good tools to maintain stability and get rid of the objects and rules that we don't use.

If you are working within a big organization, you may have some CPU and memory utilization problems. Most of the time, we are encountering these kinds of problems, and due to that, we can't use other features and blades other than the firewall or threat prevention.

I find Check Point's log experience a little tiresome as it does not provide information with limited blades enabled. We'd like to see information around session time, sent and received bytes, etc. Even if you manage to get some data, you may find it not very reliable.

For how long have I used the solution?

I've been using Check Point's NGFW and its features for about five years. 

What do I think about the stability of the solution?

I found Check Point's stability a little bit so-so. Not that good, not that bad. Most of the time it is reliable. We had lots of problems before due to the utilization of our firewalls. Most of the time, the hotfixes provided the solution. However, applying hotfixes and getting in touch with the R&D when needed may be tiresome.

What do I think about the scalability of the solution?

It's pretty good. The HA Features provide a good solution so far, and with Maestro it will perform better.

Which solution did I use previously and why did I switch?

I had the chance to work with Fortigate and Palo Alto Firewalls before. Due to the stability and know-how regarding Check Point, we chose this vendor.

What was our ROI?

We always believed and saw that the money we spent on Check Point was not in vain.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Channel Sales Manager at Ivalue Infosolution
Real User
Top 20
May 20, 2025
Real-time prevention enhances security while reporting offers room for improvement
Pros and Cons
  • "The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities."
  • "Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better."

What is our primary use case?

My main use case for Check Point NGFW is that my organization is using it as a firewall and using it in emails also.

How has it helped my organization?

I can walk you through a situation where Check Point NGFW made a difference for my organization by helping in getting or stopping the emails which are unwanted and can be harmful for my organization.

What is most valuable?

The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities.

These features impact my day-to-day operations by helping in improving the security postures in day-to-day activities.

What needs improvement?

Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better.

For how long have I used the solution?

I have been using Check Point NGFW for around half a year.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Security Consultant at SecurView
Real User
Top 5Leaderboard
May 19, 2025
Security management improves with enhanced threat prevention strategies
Pros and Cons
  • "Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management."
  • "Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture."

What is our primary use case?

The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.

How has it helped my organization?

Check Point NGFW has positively impacted my organization because, as a security provider, we have business from multiple nations worldwide, but certain nations where we do not have any business relevancy require traffic blocking.

Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management. These features have helped us manage and strengthen our security posture.

We have observed improved network visibility and control with detailed reporting and logging after implementing Check Point NGFW, along with a stronger compliance posture and reduction in incidents.

What is most valuable?

In my experience, Check Point NGFW offers excellent region-wise blocking capabilities, which proved particularly valuable during recent tension between India and Pakistan border crossing issues.

The IPS, anti-bot, threat emulation, and URL filtering features are working exceptionally well from a prevention perspective.

What needs improvement?

Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture. Licensing can be confusing and expensive, so segregating it into a simple format would be helpful.

Software updates and hot fixes require compatibility checks to avoid disrupting the production environment.

For how long have I used the solution?

I have been using Check Point NGFW for almost a year and a half.

How was the initial setup?

My experience with pricing, setup costs, and licensing for Check Point NGFW has been straightforward, as everything is better and convenient to use.

What other advice do I have?

I work in Secure System Private Limited as a security analyst for the last six years. I can share specific outcomes and metrics I have seen since using Check Point NGFW.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1088037 - PeerSpot reviewer
Senior Client Executive at a tech vendor with 10,001+ employees
MSP
Top 10
Oct 30, 2024
Powerful firewall for advanced security with robust support
Pros and Cons
  • "Check Point's support is probably the best of the major players in that space."
  • "Check Point's capabilities are limited from a firewall perspective."

What is our primary use case?

I do not use them, I just sell them, but customers are using them to protect on the edge and at the core.

What is most valuable?

It brings value to their clients as everybody is concerned with security. Firewalls are the first line of defense. Check Point's support is probably the best of the major players in that space. Check Point is more complex than the other players, but it is also more powerful.

What needs improvement?

A lot of the other players have a more robust best-of-suite offering versus the best-of-breed offering. Check Point's capabilities are limited from a firewall perspective. Other players are acquiring companies and offering add-ons like CASB or VPN-type capabilities.

For how long have I used the solution?

I have had experience with Check Point Next Generation Firewall for seven or eight years.

What do I think about the stability of the solution?

Their code is a little bit finicky as of late, but that's just because they just released this product line.

What do I think about the scalability of the solution?

It depends on what you're deploying. Maestro is more scalable than standalone firewalls.

How are customer service and support?

The support depends on what support model you buy. Customers that have dedicated support teams get more attention than the traditional support, however, a lot of other companies are offshoring their support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Cisco is not a true security company, but Check Point is where they grew up, so I think they are a little more mature.

How was the initial setup?

The initial setup depends on the environment and can take weeks. It is not different than the rest of the players in terms of maintenance.

What about the implementation team?

It's basic engineers, usually one to two people.

What was our ROI?

It is pretty difficult to determine ROI with firewalls because they are more of an insurance policy. However, it helps with security. The cost of a breach versus having some of these measures in place is the real comparison.

What's my experience with pricing, setup cost, and licensing?

There is a lot of price parity between all the players. Everybody is within plus or minus ten percent. Check Point is probably more expensive than some of the other players out there, but it is incremental.

Which other solutions did I evaluate?

I evaluated Palo Alto and Fortinet.

What other advice do I have?

I would recommend Check Point Next Generation Firewall to others. I would put them in the upper echelon.

I'd rate the solution nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.