The primary use case of this solution is to protect the organization's LAN network from cyber threats.
Network Security Engineer at Digitaltrack
Helps prevents phishing, ransomware, and zero-day attacks
Pros and Cons
- "The thing I like about this product is its capability of auto NAT and auto zone detection."
- "Service support can be improved."
What is our primary use case?
How has it helped my organization?
With the help of Check Point NGFW, we are able to prevent attacks like phishing, ransomware, zero-day attacks, malware, etc.
What is most valuable?
The thing I like about this product is its capability of auto NAT and auto zone detection.
What needs improvement?
Service support can be improved.
Buyer's Guide
Check Point Quantum Force (NGFW)
August 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for the last year.
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Customer service and support can be improved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
No, I did not use a different solution.
How was the initial setup?
The initial setup is easy.
What about the implementation team?
We implemented it through our in-house team.
What's my experience with pricing, setup cost, and licensing?
For the current market situation setup cost, pricing, and licensing look fine.
Which other solutions did I evaluate?
No, I did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Manager - IT at NVCL Group
By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization
Pros and Cons
- "It enhanced our organization's security posture compared to our previous solution."
What is our primary use case?
The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies.
How has it helped my organization?
It enhanced our organization's security posture compared to our previous solution. It offers superior protection with advanced threat management capabilities, including robust firewall defenses, intrusion prevention, and real-time anti-virus and anti-malware protection.
This has markedly reduced our vulnerability to cyber threats. Additionally, the appliance's content filtering and application control features have enabled us to manage bandwidth more efficiently, prioritizing critical business applications and preventing unnecessary traffic. This optimization has not only improved network performance but also reduced operational costs by eliminating bandwidth wastage.
What is most valuable?
The WatchTower feature is particularly valuable, providing real-time monitoring of incidents, which enhances our ability to promptly address and mitigate security threats, ultimately leading to reduced overheads and improved overall efficiency.
The WatchTower app is accessible from mobile devices, providing administrators with the flexibility to monitor and manage security on the go. This mobility ensures that security management is not confined to the office, allowing for rapid response even when off-site.
What needs improvement?
They should improve integration with third-party security tools and software for a more unified security ecosystem.
They should enhance compatibility with various network environments and cloud platforms can be valuable. Offer more comprehensive support options, including extended hours and more accessible resources.
They should provide more extensive training materials and documentation to help users maximize the appliance's capabilities. Integrate user awareness and training modules within the appliance to educate employees on security best practices.
For how long have I used the solution?
We have been using it for more than two years.
What do I think about the stability of the solution?
Stability is exceptionally positive. Since its implementation, the appliance has demonstrated remarkable reliability and uptime, consistently maintaining our network's security without disruptions
What do I think about the scalability of the solution?
It provides a robust and scalable solution that meets both our current requirements and future growth plans.
How are customer service and support?
Customer service is overall good, but we would like it to be more enchnaced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used a different security solution but we switched it because of a phishing attack. Though we had a solution, it had not done its job perfectly.
How was the initial setup?
The setup is straightforward.
What about the implementation team?
We implemented it through a vendor. I would rate it an eight out of ten.
What was our ROI?
It helped us reduce operational costs associated with network security. By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization.
What's my experience with pricing, setup cost, and licensing?
Setup cost is not much, hence pricing and licensing need to be considered. If pricing gets lower that would be great.
Which other solutions did I evaluate?
We previously used a different security solution but switched to the Quantum Spark Security Appliance 1570 due to several issues with the old system. Our previous solution lacked advanced threat management features like real-time anti-virus and anti-malware protection, and had ineffective bandwidth management leading to network performance bottlenecks.
What other advice do I have?
This is a best solution for us so far and we recommend this to anyone.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
August 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Chief Information Security Officer at a consultancy with 1-10 employees
Safeguards networks against a wide range of cyber threats with its robust security features, advanced threat prevention and centralized management
Pros and Cons
- "Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness."
- "Scalability should be improved."
What is our primary use case?
It can function as either a standalone appliance or as part of a clustered solution, offering flexibility to suit the needs of various customers, ranging from small businesses to large enterprises. We have experience working with a diverse clientele across different industries, leveraging Check Point's solutions to provide comprehensive network security tailored to each organization's requirements.
What is most valuable?
Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness.
What needs improvement?
Managing a smaller number of firewalls is straightforward, but as the scale increases, especially with numerous firewall instances, the complexity grows significantly. Scalability should be improved.
For how long have I used the solution?
I have been working with it for twenty years.
What do I think about the stability of the solution?
It offers good stability capabilities.
What do I think about the scalability of the solution?
We've encountered challenges related to scalability, particularly with its performance slowing down as the volume of objects in the network grows.
How are customer service and support?
While most engineers are typically responsive, there may be variations in their availability and response times. I would rate its customer service and support eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I also work with Fortinet, and I find it preferable because it offers a wider range of options. Additionally, its integrated package functions exceptionally well, with seamless coordination between services.
How was the initial setup?
The initial setup process is typically straightforward for most customers. However, when comparing Check Point with other solutions like FortiGate, there's a notable difference in how policy rules are implemented. With Check Point, you need to install the entire policy each time you want to make changes, whereas FortiGate allows for more streamlined updates by simply accepting the modifications. This can sometimes add complexity to installing a new policy with Check Point.
What about the implementation team?
The deployment time varies depending on the scale of the project. For small cases, it may only take a couple of minutes, while larger-scale deployments can span up to a month. Having a skilled engineer is crucial; one proficient engineer can handle the job effectively. Maintenance is relatively straightforward.
What's my experience with pricing, setup cost, and licensing?
While it may be slightly more expensive, when compared with competition it is reasonable. Licenses are renewed annually.
What other advice do I have?
Overall, I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Consultant
Works at sep2
Good application control/URL filtering with helpful support
Pros and Cons
- "The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network."
- "One feature that could be improved is the internet object in the application control/URL filtering blade."
What is our primary use case?
My primary use case of Check Point's firewalls is to provide in-depth network filtering with advanced threat prevention, which can be set up simply using autonomous threat prevention where the firewall learns about the environment and then actions threat prevention based upon that. The threat prevention can also be custom-built for your environment.
I also use the Check Point Always On VPN for remote endpoints, which allows users to authenticate and connect to the VPN pre-login without any input from the users.
How has it helped my organization?
It has improved my organization due to the in-depth security it provides. Check Point has a lot of security-focused features that provide a great level of network security. It has improved the security posture of the organization due to the granularity that can be set in the policies, such as using access roles to set user-based access, and time-based rules to only apply a specific firewall rule at a specific time. It has also improved my organization because of the in-depth troubleshooting steps that are made available to the end user, meaning we can troubleshoot issues easily, and troubleshooting steps can get very advanced.
What is most valuable?
I have found the VPN and the application control/URL filtering the most valuable features. The main reason for this is that the VPN blade allows easy VPN setup between two VPN gateways, allowing for not only site-to-site VPNs but also for remote users to connect to the Check Point gateways. This feature is easy to set up. Also, users can troubleshoot the VPNs very in-depth.
The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network. Instead of just allowing certain Layer 4 ports in/out of the network, specific applications can be allowed, which not only can tighten a security posture. It makes administering the product easier as, when a new app is rolled out, it can simply be added to the policy.
What needs improvement?
One feature that could be improved is the internet object in the application control/URL filtering blade. In most deployments, this works as it says it will. However, the object is based on topology, not internet IP ranges. This means that in certain scenarios (and likely a non-standard deployment), the internet object can not refer to the internet. This can be bypassed by creating a networking group containing class A, B & C networks and using this in the policy, right-clicking the group and ticking 'negate.'
Another improvement would be to improve the simplicity of deploying SAML as an authentication option when connecting using a remote access VPN. Check Point's deployment guide is very in-depth. However, the process could be simpler.
For how long have I used the solution?
I've used the solution for three years.
What do I think about the stability of the solution?
The stability is very good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Support is very good from Check Point.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be straightforward or complex depending on the complexity of the environment. Usually, it is fairly straightforward.
What about the implementation team?
We implemented the solution in-house.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. I provide Check Point support, as well as use these firewalls.
Network Engineer at a tech vendor with 201-500 employees
Good remote access, reporting, and firewall rules
Pros and Cons
- "With the outstanding capabilities of Check Point, we managed to have stable site-to-site VPNs with all our partners and with every other vendor's devices."
- "SmartEvent Settings and Policy GUI, and the rest of external apps should be improved."
What is our primary use case?
My company had the need to replace the existing firewall cluster of our data center, due to the end of support and end of life of the model. The choice of our next firewall depended on the following:
1) Ease of use
2) Ease of deployment
3)Centralized Management
4) Remote Access VPN Support
5) Strong Forums and Community
6) Strong Technical Support in case of any failure
7) Training of administrators via vendor certifications
8) Reporting capabilities for capacity planning
We have many site-to-site VPNs with our partners; they access our platform via site-to-site VPNs, remote access VPNs, and the internet.
How has it helped my organization?
With the outstanding capabilities of Check Point, we managed to have stable site-to-site VPNs with all our partners and with every other vendor's devices. The remote access capabilities and features are considered very strong, since the settings are excessive, and focused on each customer's need.
The IPS engine and all threat prevention features are considered stable. Central management of every firewall spread all over the world is achieved by setting up an SMS server, which makes our lives easier.
What is most valuable?
SMS server is considered very valuable, as Central management of every firewall spread all over the world is achieved by setting it up.
Remote Access VPN is used by our company for work-from-home purposes of our employees and for partners that need to access our resources.
Reporting of network interface traffic is very valuable since capacity planning for the next quarter or year takes place, and provides us with valid data.
Firewall access rules contain the negative choice.
IPS engine protects our infrastructure from malicious events.
NAT counters, ACL Counters.
What needs improvement?
Monitoring of the site-to-site VPNs and administration of the site-to-site VPNs (bring tunnel down, bring tunnel up) should be improved, as this will make the troubleshooting process easier, if something goes wrong, in order to understand which side has the issue.
As a company, we have the need to pass traffic from one site to site VPN to another, and this is not achieved directly via ACL policies; we need to create another VS environment in order to achieve it.
SmartEvent Settings and Policy GUI, and the rest of external apps should be improved.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Specialist at Tech Mahindra
Customizable with good filtering and fair pricing
Pros and Cons
- "It offers services like navigation, control, and filtering, which ensure that all users stay connected to business applications."
- "They need to offer quicker resolution and maintenance during downtime."
What is our primary use case?
Check Point Next Generation Firewall is one of the most secure and stable firewalls present in the market. the integration & implementation of Check Point Next Generation firewall took place due to security concerns, and we were impressed by what this product brings with it.
The integration of Check Point Next Generation Firewall in my organization has taken over one year or so, and it helps to segregate the internal network and build a secure VLAN that separates every department.
Scalability, end-to-end resolution, and customized productive services make Check Point Next Generation Firewall far better than the alternatives present in the market. It has services like navigation, control, and filtering that ensure that all users stay connected to business applications and helps restrict traffic.
How has it helped my organization?
The integration of Check Point Next Generation Firewall proved to be highly productive and scalable, and everything was offered at a lower price.
Check Point Next Generation Firewall helped out us drive innovation and growth in our organization. It provided a safe passage for system and data security via its services of navigation, control, and filtering. The product ensures that all users stay connected to business applications and helps restrict traffic.
Overall, the Check Point Next Generation Firewall protects us from all types of internal and external threats while being easy to use and set up.
What is most valuable?
The integration of the Check Point Next Generation Firewall in my organization has taken over one year. It helps to segregate the internal network and build a secure VLAN that separates every department.
We like the scalability, end-to-end resolution, and customized productive services. This makes Check Point Next Generation Firewall far better than any alternative present in the market.
It offers services like navigation, control, and filtering, which ensure that all users stay connected to business applications.
Check Point Next Generation Firewall Protects systems from all types of internal and external threats.
What needs improvement?
Check Point Next Generation Firewall requires frequent updates. They need to build a more user-friendly dashboard and have the implementation of more active VPN support.
Apart from this, Check Point Next Generation Firewall customer support service needs to be improved. They need to offer quicker resolution and maintenance during downtime.
Check Point Next Generation Firewall Protects from all types of internal and external attacks and is a must-have software for professionals and organizations.
For how long have I used the solution?
It has been more than one year since I integrated Check Point NGFW.
Which solution did I use previously and why did I switch?
I haven't been in integration with any other solution.
We decided on this solution after looking at reviews and comparing prices. Check Point proved to be the best option in the end.
What's my experience with pricing, setup cost, and licensing?
I would advise others to go for it. It's easy to set up and available at lower pricing than alternatives.
Which other solutions did I evaluate?
No, we did not evaluate other options. We just compared other alternatives from some review websites and decided to go for Check Point.
What other advice do I have?
It's a must-integrate solution for professionals and organizations.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Administrator at a computer software company with 1,001-5,000 employees
Controls traffic, offers good application control, and has great URL filtering
Pros and Cons
- "As with any firewall, IPSEC VPN is the critical functionality. Not every organization has the budget to implement MPLS or SD-WAN, which makes IPSEC the go-to for site-to-site connectivity."
- "One feature I have yet to see implemented is authenticated email support for alerts generated via the GW or SMS."
What is our primary use case?
The primary use of Check Point NGFW is as a firewall that gives us the control of allowing in non-threatening traffic in and blocking malicious traffic. It is also a valuable tool that allows us to interconnect our remote sites via IPSEC VPN.
This, alongside all of the basic blades such as Application Control, allows us to be granular when choosing what applications we allow within our organization and additionally filters based on categories combined with identity awareness. This allows us to be as granular as we would like with specific users/departments within our organization.
How has it helped my organization?
Check Point NGFW was one of the top contenders when we were looking to implement a new firewall strategy.
We have had some issues with VPN tunnels specific to AWS, which were eventually resolved after a lengthy case however, other than that, the features offered are all great, and the firewall has done its job to my expectation.
It is, however, difficult at times to read the actual documentation for the blades/appliance as it would appear that sometimes the terminology is incorrect or skewed, which leads to a longer implementation time.
What is most valuable?
As with any firewall, IPSEC VPN is the critical functionality. Not every organization has the budget to implement MPLS or SD-WAN, which makes IPSEC the go-to for site-to-site connectivity.
Another critical blade/feature is the application control blade in combination with URL filtering. These two security features, tied together with identity awareness, are a game changer and allows an admin to be as granular as possible when blocking specific applications or allowing a specific application to a specific user/department within the organization
What needs improvement?
Being on R80.40, I am sure a bunch of features have already been implemented that I am not currently taking advantage of. However, one feature I have yet to see implemented is authenticated email support for alerts generated via the GW or SMS. As a security product, it is mind-blowing that this is not a thing today, and it only relies on SMTP un-authenticated to send emails to administrators. However, I'm not sure if that really applies to the firewall itself or if it is more so a topic of discussion for the SMS.
For how long have I used the solution?
I've used the solution for five years.
Which solution did I use previously and why did I switch?
We switched from SonicWall back in the day due to the feature sets available at the time.
Which other solutions did I evaluate?
We also evaluated Palo Alto.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Security Specialist at AKBANK TAS
Smart, simple, and user-friendly
Pros and Cons
- "The solution offers a good GUI."
- "The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions."
What is our primary use case?
We are using physical appliances along with some VSX's in our network. We mostly use firewall only (due to high traffic usage). We are using CP NGFW to protect the company from the internet and also provide security while we are connecting to the internet.
We have physical clusters that we manage via our company's external connections through S2S. We are managing our core and client networks with separate clusters. Applying security rules and providing NAT when we need it. We are also using CP in our DRC environment to provide SRC and DST NAT with VSX to provide access to machines that have the same IP addresses.
How has it helped my organization?
Back when we had a different brand of firewalls, we were having trouble managing all of them separately. With Check Point's HA capability, we merged all of our Check Point firewall management. With this, we can apply a viable DRC solution that our company needs and also manage, view logs, and administer all of the components together.
With the capable appliances, we don't experience any CPU and Memory utilization most of the time. With the help of new versions, Check Point is moving forward. We hope the upcoming version will provide hyper flow, and this will solve our elephant flow problem.
What is most valuable?
The solution offers a good GUI. It is easy to use, smart, simple, and user-friendly.
The client VPN and S2S VPN capabilities are great. Check Point's mobile access provides us with flexibility. We don't have a single point of failure regarding the VPN access points anymore.
We can use Check Point NGFW physically, virtually (with Check Point VSX), and on the cloud with CloudGuard. We have most of the features available even within these different environments.
We can apply SAM Rules (without installation needs), and Custom Intelligence Feeds.
It has good API support and provides value when you need it.
What needs improvement?
The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions. Other vendors provide this, including Palo Alto). We are in a big organization now, and we need good tools to maintain stability and get rid of the objects and rules that we don't use.
If you are working within a big organization, you may have some CPU and memory utilization problems. Most of the time, we are encountering these kinds of problems, and due to that, we can't use other features and blades other than the firewall or threat prevention.
I find Check Point's log experience a little tiresome as it does not provide information with limited blades enabled. We'd like to see information around session time, sent and received bytes, etc. Even if you manage to get some data, you may find it not very reliable.
For how long have I used the solution?
I've been using Check Point's NGFW and its features for about five years.
What do I think about the stability of the solution?
I found Check Point's stability a little bit so-so. Not that good, not that bad. Most of the time it is reliable. We had lots of problems before due to the utilization of our firewalls. Most of the time, the hotfixes provided the solution. However, applying hotfixes and getting in touch with the R&D when needed may be tiresome.
What do I think about the scalability of the solution?
It's pretty good. The HA Features provide a good solution so far, and with Maestro it will perform better.
Which solution did I use previously and why did I switch?
I had the chance to work with Fortigate and Palo Alto Firewalls before. Due to the stability and know-how regarding Check Point, we chose this vendor.
What was our ROI?
We always believed and saw that the money we spent on Check Point was not in vain.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?