The primary use case of this solution is to protect the organization's LAN network from cyber threats.
Senior Network Security Engineer at DigitalTrack Solutions Pvt Ltd
Helps prevents phishing, ransomware, and zero-day attacks
Pros and Cons
- "The thing I like about this product is its capability of auto NAT and auto zone detection."
- "Service support can be improved."
What is our primary use case?
How has it helped my organization?
With the help of Check Point NGFW, we are able to prevent attacks like phishing, ransomware, zero-day attacks, malware, etc.
What is most valuable?
The thing I like about this product is its capability of auto NAT and auto zone detection.
What needs improvement?
Service support can be improved.
Buyer's Guide
Check Point Quantum Force (NGFW)
March 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for the last year.
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Customer service and support can be improved.
Which solution did I use previously and why did I switch?
No, I did not use a different solution.
How was the initial setup?
The initial setup is easy.
What about the implementation team?
We implemented it through our in-house team.
What's my experience with pricing, setup cost, and licensing?
For the current market situation setup cost, pricing, and licensing look fine.
Which other solutions did I evaluate?
No, I did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Offers great adaptability and a configurable nature
Pros and Cons
- "The solution's most valuable feature is its adaptability and configurable nature."
- "The product's price is an area of concern, making it an area where I would like to see some improvements."
What is our primary use case?
I use the solution in my company for cybersecurity, securing perimeter networks, giving the user access to VPN, URL filtering, antivirus, sandblast, network segmentation, and monitoring purposes.
How has it helped my organization?
Regarding the benefits of using the tool, I would say we spend less time investigating security incidents because we have fewer of them to deal with because Check Point works quite well. The tool offers greater visibility when it comes to network traffic.
What is most valuable?
The solution's most valuable feature is its adaptability and configurable nature. The software's security posture, I would say, has reduced vulnerabilities than other vendors, and we value that greatly in our company.
What needs improvement?
The product's support is an area of concern where improvements are required. Sometimes, there are bugs in the software, and the speed at which the product resolves those bugs could be improved. The system is quite complex, and you need to be an expert to get the most benefits, making it an area where the tool could be improved.
It would be nice if Check Point could update its own agents, for example, VPN clients or identity clients. I think the product has a very large number of features.
The product's price is an area of concern, making it an area where I would like to see some improvements.
For how long have I used the solution?
I have been using Check Point NGFW for a bit less than fifteen years. I use Check Point R81.20.
What do I think about the stability of the solution?
In the past three months, my company has had stability issues, but the impact was quite low, which is great because we have a cluster environment. When one node fails, the other one picks up the job. When changing from version to version, sometimes bugs show up that need to be resolved.
What do I think about the scalability of the solution?
The tool allows you to add as many nodes as you like or can afford. If it is virtualized, you can also give it more resources.
In my company, I think we have four nodes, which are the main nodes, and then we have eight smaller regional nodes. We have around 260 users and 280 endpoints.
How are customer service and support?
I rate the technical support a five or six out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The product's initial setup phase was so long ago that I don't remember how it went. The product is not the most intuitive and easy to set up because of the large number of settings you can configure and the ways how you can configure those settings. Without an expert or consultant, I wouldn't recommend implementing the tool by yourself if you value your time and don't want a big downtime later.
What was our ROI?
The tool's ROI is almost impossible to calculate because it's a security product. If nothing happens, then you always feel like you are paying too much, but you don't know how the situation would change if you use cheaper firewalls and have to face a security breach.
What's my experience with pricing, setup cost, and licensing?
The product's price is on the higher side but I also feel that it is more secure than the other solutions in the market.
Which other solutions did I evaluate?
In the past, my company had tested Fortinet and Sophos, but we did not migrate to them. Though the price of the firewalls from Fortinet and Sophos were better, from a security perspective, Check Point was better. In the recent years, there have been a lot of critical vulnerabilities detected in those firewalls and breaches because those vulnerabilities were detected and we didn't get them. So we value that greatly.
What other advice do I have?
The tool requires maintenance. You need to update the product version. If we don't encounter any bugs in the installation process, I would say that the maintenance process is quite straightforward.
I recommend the tool to others. If you value your data and it is a mission-critical project, then Check Point is the right choice.
I rate the tool an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
March 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.
Presales IT solutions at ICCO
Monitors traffic well, is user-friendly and offers a good dashboard
Pros and Cons
- "The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events."
- "Timely updates to security databases, firmware, and software are crucial for addressing new threats."
What is our primary use case?
We are using the product in a small office to secure our network to configure the firewall settings to control incoming and outgoing traffic.
This includes setting up rules for allowing or blocking specific types of traffic.
We use intrusion prevention features to detect and prevent potential threats and attacks on your network.
It enables logging and monitoring features to keep track of network activity and identify potential security incidents.
With the solution, we can implement strong user authentication mechanisms to control access to your network resources.
How has it helped my organization?
The use of Check Point NGFW makes our business feel safer.
NGFWs typically include advanced threat prevention mechanisms, such as intrusion prevention systems (IPS), antivirus, anti-malware, and threat intelligence. These features help protect your network from a wide range of cyber threats.
NGFWs can integrate with user identity management systems, enabling more granular control over network access based on user identities. This is particularly important for enforcing security policies on a per-user basis.
What is most valuable?
The interface is user-friendly, and also they give you small training courses on the Coursera website to explain how to use the products.
The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events. This helps administrators get a snapshot of the network's security posture.
The ability to monitor network traffic and security events in real time is crucial. Check Point's interface often provides real-time visibility into network activity, making it easier to identify potential issues or threats.
What needs improvement?
Their products are pretty complete, and the explanations are very well done.
Check Point offers training and certification programs for administrators and security professionals. These programs help individuals develop the skills needed to effectively manage and secure networks using Check Point products.
Timely updates to security databases, firmware, and software are crucial for addressing new threats. Check Point's commitment to providing ongoing support ensures that organizations have access to assistance when needed.
For how long have I used the solution?
We have been using this solution for the last two years already.
What do I think about the stability of the solution?
The solution we use is pretty complete. For the moment, the stability is good enough for us.
What do I think about the scalability of the solution?
CkeckPoint has solutions for different sizes of companies. Therefore, the solution is scalable. The client has to choose the right solution for their needs. If you call the contact center, they can advise you on your options.
How are customer service and support?
We have not used technical support, up until now we haven't needed them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a normal antivirus on the endpoints previously. However, after we took a cybersecurity course, we understood that a bigger security solution was needed.
How was the initial setup?
The initial setup is easy. You just click through, next, next, next, and take some steps to make an account and do some basic setups. Everything basically works out of the box.
What about the implementation team?
We implemented the solution through a vendor team; they had well-trained technicians.
What was our ROI?
To feel safer in the online environment is the most important thing these days. Everything is online now. A solution like that makes it easier and safer for you to work and do things online.
What's my experience with pricing, setup cost, and licensing?
After researching what's available in the market, choose a product. Read reviews and watch demos to assess the user interface and learn what options the product offers.
Which other solutions did I evaluate?
We searched the market for months before we chose Check Point. There are many security solutions on the market, both for on-premises and on the cloud. We chose Check Point for the ease of use.
What other advice do I have?
The solution is perfect for us. That said, for each client, the needs are different.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.
Connects seamlessly with Active Directory and offers good application control and web filtering
Pros and Cons
- "I have to say that it was Application Control and web filtering are excellent."
- "It would be nice if there is a mobile-friendly console for our techs."
What is our primary use case?
We have deployed this product for the protection of our MPLS connection between 20 geographic distinct sites, two data centers, and an internet connection.
We are also using the product to establish IPsec tunnels with 5 external entities totally transparent to our users.
We're a new company that started to invest in cybersecurity and protection products and chose Check Point for their cloud solutions that protect a vast majority of our devices.
We are happy with the deployment of the product and the ease of use.
How has it helped my organization?
Since the deployment and go-live of the solution, we noted a rise in productivity of some people, we think it has to do with the deployment of the application control and web filtering capabilities of the product.
We're also happy with the deployment process and the help that the Check Point partner provided in the initial configuration of the product.
Our users also noted more speed on the internet connection, as I said probably because of the block rules implemented with the features mentioned above.
What is most valuable?
I have to say that it was Application Control and web filtering are excellent. We knew we had users watching videos and using not approved apps yet didn't have a way to centrally block them. With NGFW we do and we can set up profiles/groups of users with different permissions which allow for example IT to have media streaming access and "regular" users don't.
Also having a VPN concentrator on the same device is a plus since made our user management with Active Directory connection a lot easier and faster.
What needs improvement?
We're a new company so regarding additional features we can name only a few, for example, a better API for extracting data so that we can integrate with our monitoring solution, at the moment we use Nagios/Icinga.
It would be nice if there is a mobile-friendly console for our techs so that they can help users when not at their desks since they do frequent external work.
Better connection between the legacy console and the new one since we have a company that still uses an on-prem device and we have to use two consoles.
For how long have I used the solution?
We've been using this product for one year.
Which solution did I use previously and why did I switch?
We didn't use a previous solution.
What's my experience with pricing, setup cost, and licensing?
I'd advise others to read the license differences and features.
Which other solutions did I evaluate?
We've evaluated Fortinet and Forscout products.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Ts Systems Integration Specialist at NTT Security
User-friendly with good dashboards and helpful support
Pros and Cons
- "The Check Point firewall features for Next Generation Firewalls are excellent."
- "Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and auditors are forced to have the latest possible environments."
What is our primary use case?
Our customer has been the best in stock trading; they observed that in peak hours or business hours buying and selling the stocks was time-consuming.
When they reached out to the firewall team, we checked the disk space, memory, and HDD we didn't notice much difference.
However, we monitored the interface utilization, and 1 GB was choking up and being consumed. The cpstat status on the interface level monitor and bundling the multiple interfaces fixed the issue.
How has it helped my organization?
We have been fixing the performance and also found that the solution offers:
1. A user-friendly dashboard with all the information available in front view and we view according to our requirements in graphical, statistically, etc.
2. Check Point firewall can combine all locations in one Check Point management console so that we can monitor everything with alert configuration.
3. We have multiple options for SIC resetting.
4. We can monitor the complete organization (for RAM, Memory, Disk, and CPU) and alert handle monitoring. We can now easily handle failovers.
What is most valuable?
The Check Point firewall features for Next Generation Firewalls are excellent. Through scripts, we can easily push firewall rules, extract, and import as per availability. Scripting is the best way to support the firewall functionality and it's been supported by all major versions. We can monitor all types of logs (traffic logs, management logs, and active logs).
The firewall is EDR-supported; we can block or allow the URLs as per phishing or detection.
Firewall flow and logs analysis is awesome.
What needs improvement?
Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and auditors are forced to have the latest possible environments.
Check Point's major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.
As for deployment, we follow best practices for long-term support services. Tools must be introduced and supportive in analyzing the data, flow, and threats. We have to introduce the scripting part to work seamlessly.
For how long have I used the solution?
I've been using the solution for more than ten years.
What do I think about the stability of the solution?
The stability offers high performance.
What do I think about the scalability of the solution?
The scalability offers high performance.
How are customer service and support?
The support is the best in the marketplace.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution. It's the best in the marketplace and stronger than any other firewall. We can trust it 100%.
How was the initial setup?
The initial setup was complex.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
Definitely, every sector [banks, finance, corporate, etc] should have a Check Point Firewall for strengthening/securing the environment.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Junior Cyber Security Analyst | CCSE | CCSA | CC at Security4IT
Good support, threat extraction, and analysis
Pros and Cons
- "I haven't had any data leaks or vulnerability situations."
- "It could be easier to manage the licenses on blades and contracts."
What is our primary use case?
I usually apply Check Point to protect my customer's environment as a main solution boundary gateway, DMZ gateway, LAN gateway, or VPN site-to-site with other Check Point appliances and other vendors. I do a Harmony Endpoint full integration. I use other tools such as threat prevention blades (like IPS and IDS), anti-virus, anti-bot, anti-malware, and the Sandblast solution.
How has it helped my organization?
I haven't had any data leaks or vulnerability situations. The NGFW has been working as it should! It's performing well and offers great security for me and my customers by protecting the environment. Administrators can easily follow and monitor security events, or the health status of the environment or appliance using Smarteview, SmartEvent, and the monitoring blade. We can look at CPU usage, disk space, and traffic and can see user history in real-time.
What is most valuable?
The threat extraction is the most valuable aspect. It protects the final user and prevents them from falling into the trap of infected files. When a file needs to be downloaded by a machine user, this solution analyzes the file at the same time to send to the user a clean version of this file. If not infected, the real version is available. The threat emulation can scan the computer applications searching for malicious activities and block them according to policy.
What needs improvement?
It could be easier to manage the licenses on blades and contracts. If you have a large environment it will take too much time for your team to verify if all the licenses and contracts are correct and work well. Although it is possible to manage licenses using SmartUpate and SmartConsole, if there are issues, you can only fix them using an expert shell. Simplifying the process would help simplify the daily tasks of administrators.
For how long have I used the solution?
I've been using the solution for two years.
How are customer service and support?
Technical support works well.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
NGFW is not a cheap solution, however, it does guarantee security. If the goal is to protect assets, using NGFW by Check Point helps immensely.
Which other solutions did I evaluate?
I use this in my company environment. I did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. I am security analyst and support my company environment and customer environment. I work with this solution daily.
Flat Earth Networking, Inc. at Cyber Security Engineer
Good logging and searchability with useful free trial licenses
Pros and Cons
- "Being able to search in clear text is simple for the customer and for troubleshooting an environment."
- "It's too expensive for mid-market companies."
What is our primary use case?
We have multiple customers that use this product. Integrated logging is the best around.
It's clear and does the job it's supposed to do.
We typically install this as the network edges and encourage our customers to have one at each location. Some prefer to backhall the smaller sites to the main branch where it handles all the inspection and rules.
We also set up multifactor SSL VPN solutions at the main location which allows visibility into remote worker traffic. Overall, it's used mostly by small to medium businesses.
How has it helped my organization?
We have been able to sell this product for a long time as it's highly rated and has a deep feature set. We have probably sold millions of dollars worth of Check Point products over the years.
When the customer comes to us wanting the most protection we typically suggest Check Point first. Our engineers enjoy being able to quickly deploy a solution and have the familiarity with the product to be able to troubleshoot it quickly once it's deployed. For the most part, we train our customers to be able to manage it themselves.
What is most valuable?
Mostly the logging features of the Check Point NGFW are the most valuable. Being able to search in clear text is simple for the customer and for troubleshooting an environment.
I also like that you can get trial licenses for just about every product solution. This allows us to suggest a feature, implement it, and then show the customer that it has value. We tend to retain the customer on that product for the long term once it has been deployed and they are able to see what it's doing to protect them.
What needs improvement?
The only thing holding it back is the price. It's too expensive for mid-market companies. There are other platforms that have emerged that have a similar feature set, however, are more difficult to deploy. This is really only a problem for the engineers as the customer doesn't care how many hours the engineer has to put in to make it work in their environment. If the Check Point product came in at a lower price point it would make it easier for the customer to see the value in cost, thus making it easier for us to sell.
For how long have I used the solution?
I've used the solution for seven years.
What do I think about the stability of the solution?
It has been the most stable for a long time. That track record is something that you can show the customer.
What do I think about the scalability of the solution?
The product is highly scalable especially if you integrate the orchestration solution.
How are customer service and support?
Support is hit or miss lately. They have lost too many good reps to other companies.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used other solutions, however, we continue to use Check Point NGFW.
How was the initial setup?
The initial setup is simple once you have the appropriate infrastructure setup. Once Check Point gets away from the central management solution and allows for on-box management it will make small businesses happier.
What about the implementation team?
I am part of the vendor team. We do a good job implementing it, although sometimes it takes too much time to deploy a product.
What was our ROI?
We tell the customer that the ROI is the protection they are receiving and the stability of the product.
What's my experience with pricing, setup cost, and licensing?
We tell customers truthfully it's the best product, however, it has the highest cost and you'll pay for each license.
Which other solutions did I evaluate?
We are always evaluating other solutions for our customers. Palo Alto and Fortigate are the top two others at the moment.
What other advice do I have?
They just need to get the pricing down or do a better job of bundling the licensing.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a reseller
IT Security Pre Sales Engineer at Westnet S.A.
A scalable and easy-to-deploy solution that enables organizations to see what their employees are downloading from the internet
Pros and Cons
- "Sandboxing is the most valuable feature."
- "The support team should be faster."
What is our primary use case?
We use the solution to configure sandboxing features for enterprises. We also use it for policy-level configurations and VPNs.
What is most valuable?
Sandboxing is the most valuable feature. A majority of the configurations are very accurate. We can find what an organization's user is downloading from the internet.
What needs improvement?
The support team should be faster.
For how long have I used the solution?
I have been using the solution since 2016.
What do I think about the stability of the solution?
All products have some bugs. However, we had a minimum bug experience with Check Point. I rate the tool’s stability an eight out of ten.
What do I think about the scalability of the solution?
The product is scalable. Everyone in our company uses the product. We are 100 users. We have an on-premise firewall. We use it every day.
How are customer service and support?
I have contacted the support team. I have had good conversations with the engineers. Sometimes, it takes a little bit of time to solve some issues. If it's a complex issue, we need to start from scratch and escalate to a bigger tier of support.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is very easy.
What's my experience with pricing, setup cost, and licensing?
The product is not that expensive for what it is offering, but it could be cheaper. Nowadays, all the vendors are increasing their prices. Suggesting the product to the customers will be easier if it is a little cheaper. The tool offers good attributes.
Which other solutions did I evaluate?
Palo Alto is also a good vendor. We chose to go with Check Point as well for our enterprise solution as distributors, and we suggest it to our customers.
What other advice do I have?
I was an engineer for AT&T. I helped customers with configurations. The vendor is taking care of the user side of security with Check Point Harmony. It is a very good product. Check Point Harmony must provide administrators the ability to manage external programs remotely. Some customers want such features, and other vendors provide them. I would recommend the solution to others. The vendor has been investing a lot of money and effort to prevent zero-day attacks. Overall, I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Check Point CloudGuard Network Security
Fortinet FortiGate-VM
Juniper SRX Series Firewall
Palo Alto Networks VM-Series
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?

















