We primarily use this product for cloud computing security. It is an integration platform for IPS and I also use it for performance monitoring.
I also coach classes on the use of this firewall, which is installed on my personal laptop.
We primarily use this product for cloud computing security. It is an integration platform for IPS and I also use it for performance monitoring.
I also coach classes on the use of this firewall, which is installed on my personal laptop.
This product is more secure than other firewalls, such as FortiGate.
The information stored in the logs is very descriptive and includes a lot of details.
The dynamic port features are better when compared to other firewalls.
This firewall is difficult to manage and use when you first begin using it. However, once you are used to it, the interface is comfortable and easy to use.
The Smart Control feature is hard to install.
In the future, I would like to see more features in the unified security management platform.
This is a reliable firewall.
Scalability is not an issue with Check Point.
Technical support from Check Point is good.
I have experience with other firewalls including FortiGate. Check Point is more secure, although it is more difficult to deploy and configure.
Until you have some experience, the installation and configuration are difficult.
The licensing fees are paid on a monthly basis and I am happy with the pricing.
Check Point is responsible for inventing several firewall security features.
In summary, this is a good product and I recommend it because it the most secure firewall on the market.
I would rate this solution a nine out of ten.
We use this solution for the VPN, from site-to-site and remote.
We also use it for advanced IPS, IDS, malware protection, and the sandbox. The sandboxing functionality is one of the best features.
All of the features are very valuable, but the most valuable features are the sandboxing and the advanced IPS/IDS.
The web filtering and CLI commands need to be improved.
The CLI command is very difficult to deploy.
If you are an engineer and considering configuring through the command line, you can't. The command line is very difficult to use, which is one of the biggest drawbacks of this solution.
The initial setup could be simplified.
Technical support is another big drawback and needs to be improved.
In the next release, there should be improvements made to the sandboxing functionality.
It's a very reliable solution. There are no issues with the stability of it.
Currently, Check Point NGFW is the most scalable firewall on the market.
We have more than 500 users in our organization.
We will continue to use this solution and we plan to increase the sandboxing feature, which is the best feature of Check Point.
The technical support is not good, which is the biggest drawback to Check Point. They will never compare to Cisco. Cisco's technical support is the best.
I have also used Cisco, which is more expensive but the support is better.
The initial setup was very complex.
It can take 20 to 30 days to deploy to the network.
It is less expensive than Palo Alto.
Licensing is on a yearly basis and I am happy with the pricing.
I also considered the Palo Alto Next-Generation Firewall. I evaluated this solution and compared the price.
We chose Check Point because the price for Palo Alto is very high.
If you are looking for deep security and have a good budget for security and firewalling then I would recommend Check Point, as it will meet the requirements.
Every product has its drawbacks and advantages, but I am very happy with this solution. In my opinion, this is the best firewall in the market at the current time.
I would rate this solution a ten out of ten.
I'm a consultant at a Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I have deployed standalone, cluster, and two-layered firewalls.
Check Point firewall products include a lot of modules including Application Control, IPS, Email security, Mobile access, Content Awareness, URL Filtering, Antivirus, Antibot, and DLP.
Check Point meets our customers' requirements at the perimeter with an all-in-one solution. For example:
There are a lot of features that I have found valuable for our customers.
For example, active/active and active/standby high availability features are very useful. If you want to share traffic loads to both cluster members, you can use the active/active feature, whereas if you don't want to share traffic loads then you can prefer active standby. Your connections sync on both cluster members for either highly available choice, so your connections never lost.
One of the most valuable features is performance improvement, wherewith ClusterXL and CoreXL, you can improve performance.
Check Point should include additional management choices; for example, Check Point does not offer full management support via browser.
You should use Check Point Smart Console for management, although it is an EXE and is supported only on the MS Windows platform. If you are using Linux or Mac, you cannot manage Check Point. Instead, you need to use a virtual PC with the Windows OS installed, running inside Linux or Mac. Check Point states that this is a decision made for security reasons, but that certain management features can be done through the browser, although not fully.
I have been using the Check Point firewall for more than 20 years.
This solution is very stable for all of our customers.
One of our customers has more than 200 branch offices, which are protected by Check Point SMB appliances. All of these appliances are managed by Check Point SmartProvisioning. This customer has one Check Point cluster that secures server segments and another Check Point cluster to secure the client segment.
The latest product, Maestro is very good and scales well.
Check Point support is very good and we are very satisfied.
My company is working with different firewall products but I am a Check Point expert and only support their products.
The initial setup is straightforward.
All implementation is handled by our team.
There are different ROIs for each customer but our customers' ROIs are high, as expected.
The pricing is high compared to competitors.
Our customers evaluate other products but a lot of them prefer Check Point.
We support various clients in the government sector in Mexico. We provide different solutions in terms of network security, data security, and perimeter security. The NGFM Firewall is available locally and different offices and/or institutions of the government sector pass through a more secure and controlled infrastructure.
This type of infrastructure has different zones or areas that are managed and keeping them centralized has helped us to maintain and control them. In addition, we are generating fast and safe solutions for our users on each site.
Check Point has provided us with an easier way to control all of the access traffic for more than 50 segments that we have within the organization. In addition, we have been able to maintain stricter control of the users and/or equipment that are had in all the institutions that make up the government sector of the entity.
Check Point technology has allowed us to keep the organization and distribution of the network in order within the institution. In addition, the VPN service we have has worked correctly for users who want to work remotely from their homes, which was of great help during the pandemic.
Within the organization, the inspection of packages has given us great help in detecting traffic that may be a threat to the institution.
The configuration of policies has allowed us to maintain control of access and users for each institution that is incorporated into our headquarters. It is well organized.
Some other of the services that have worked well for us are antivirus, anti-bot, and URL filtering. Together, these have allowed us to maintain control and organization amongst the users.
Another one of the pluses that have helped us a lot has been the IPsec VPN, especially in these times of pandemic.
Using the tool is somewhat complex when teaching new staff, although after practice it is quite easy to get used to this technology.
One of the improvements that could be included is to have a help menu to obtain advice or help for the different options that are presented in the application.
The equipment is complex, so you need guidance from specialized people or those who constantly work with Check Point. Better forums and information manuals could be provided so that users from different institutions can have more access to the information.
The company has been using the Check Point NGFW for more than four years.
Compared to other networking equipment I have used, I would say that Check Point's NGFW is just as stable. We rarely have problems, and they can all be properly fixed without affecting productive or critical network elements.
There are currently more than 5,000 users within government facilities in Mexico. This team has provided us with the necessary resources to provide services to users in record time.
With the teams that we currently have, we have not considered increasing the number of technicians. If the need should arise then Check Point is still a very good option.
Technical support has been available when we have problems, and they are always there to help us get back up and running as quickly as possible. In addition, the equipment is kept up-to-date with the latest versions, or alternatively, those recommended by the provider.
This solution was deployed before I entered this governmental organization. What I have heard is that prior to this, the security and segmentation control was not ideal and they wanted to improve it. With the implementation of Check Point, great improvements have been provided to the infrastructure, maintaining order within the organization.
When I entered the company, the equipment was already installed. With the passage of time, some configurations have been improved and some extra services have also been achieved for mobile users.
It was implemented through a provider that has been guiding us towards the correct use of the equipment and the best practices to keep it updated. The service has been excellent, both in common day-to-day ticketing situations, including the most serious incidents.
It has been well worth the investment, as the Check Point technology is there to help when we need it.
One of the main reasons that Check Point is used is that it helps us to administer security at a reasonable price. This is naturally in addition to meeting the expectations of the institution.
An annual technical support fee is paid to maintain the equipment with the most updated licenses and versions and thus avoid vulnerabilities
Check Point is the option that has always been considered for its good firewall organization, which allows us to have excellent security.
My advice is to always have a supplier with whom you can resolve doubts or more specific technical questions. Since the equipment requires many very technical parameters, it is helpful to have a person who understands and uses this technology correctly.
We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers.
Currently, we are using the R80.20 firmware version and we have a pretty simple design.
Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.
With Check Point, we achieved redundancy but the problem was three public IP addresses that were required to be configured as HA, with two physical IPs & one virtual IP.
Our previous firewall used a single public IP but now, with Check Point using three, it became very difficult for us to make available the same segment of public IP addresses from our ISP. After many support calls, however, we found a solution.
The other option which is helpful is that there are no limits for any objects used in the policy. Our previous firewall does support limited time objects & IP address objects.
Check Point's new Smart dashboard has an all-in-one configuration interface. They provide a very easy configuration for NAT and one tick for source & destination NAT is possible.
Policies can be configured in a more organized way using a section & layered approach.
Application control has all of the required application data to introduce it into policy and the URL filtering works great, although creating regular expressions is complicated.
The software upgrade procedure is very easy; it just needs few clicks & we are done.
Check Point has both GUI (Graphical Interface) & smart dashboard, but it will be better if it sticks to either one of them.
A threat prevention policy needs to be created in a different tab but instead, if those policies could be related to access policy then it will be easier to apply the threat prevention to our relevant traffic.
One of the most complicated aspects is the VPN Configuration, which should be simplified in future releases. The monitor tab should have a VPN tab, where we can see the current tunnel status.
I have been using Check Point NGFW for more than the last three years.
With respect to stability, we always have ongoing support calls. We have faced lots of issues that have led to upgrading with a Hotfix.
When it comes to scalability, our current Check Point is far better than our previous firewall.
Technical support is very helpful & always there to help us with issues. Also, the TAC response is quick.
Previously, we had a Fortinet firewall, which was pretty slow when it came to operations.
The initial setup was simple.
We implemented the firewalls with our in-house team.
Check Point should provide some basic license for mobile access VPN by default, for at least five to ten users.
The only other vendor that we have evaluated is Fortinet.
We use this firewall to protect the internal network and to set up the IPSec standard from one location to another.
One of the benefits that we have realized from using this product is that the user interface makes it easier to operate, compared to using the CLI. In Check Point 5.0, we bought the option, giving us the ability to use the GUI as well as the CLI. A person who is comfortable with the UI can work with it according to different scenarios.
The most valuable feature is the set of encryption options that are available.
Viewing the logs in the interface is easy to do, which is one of the things that I like.
This is a UI-based firewall that is easy to use.
The antivirus feature is a little bit weak and should be improved. The updates are not as regular when compared to other firewalls, such as Palo Alto.
The training materials and certification process should be improved. For example, the certificates are more expensive and there's no good training available on the internet right now.
I have been using Check Point NGFW for approximately seven years, since 2014.
The stability of this firewall is good and we haven't had any problems. It is a well-known, quality brand.
There are no issues with extendability or scalability. Over the course of a year, we added another firewall, bringing us from one to two deployments, and the process was not tough. We were easily able to manage it.
We have approximately 12 people who work with this firewall during different shifts.
I have been in contact with technical support many times, and they are good. Most of the time, they solve the problem as soon as possible, and they give a perfect solution.
Currently, we are using firewalls from different vendors, including Palo Alto and Cisco. Our Cisco ASA solution is completely CLI-based and Palo Alto is like Check Point with an interface that is a mix of UI and CLI-based.
Both Palo Alto and Cisco ASA have very good tutorials available on the internet, including videos on YouTube and courses on Udemy.
On the other hand, Cisco ASA is more difficult to use because there is no UI and for a person who does not have any knowledge of the networking commands, they have to learn them.
The first phase of the implementation is to plan the firewall deployment. After that, we do the configuration and validate it. In the case of a Check Point firewall, this process will take between two and three months to complete.
The complexity of the process depends on the features that you want to add. In general, it is straightforward and not too complex.
I was not present when the first firewall was set up, although I was presented for the deployment of new ones. Whenever there is a new firewall deployment, I am involved. We have between four and five network engineers who take care of this part.
There is no maintenance required from our side. When we have a hardware issue then we contact technical support to get it sorted out.
We have seen ROI; for the purpose that we have deployed this firewall, we are getting returns. Based on this, we are buying more Check Point firewalls.
The price of Check Point is lower than Palo Alto but higher than Cisco ASA. For us, the price for licensing is fine, we have no issue with it, and feel that the cost is justified.
There are no costs in addition to the standard licensing fees.
My advice for anybody who is implementing Check Point NGFW is that if they get stuck, then visit the technical support section of the website and read the articles that are available. I have learned many things from the tech articles, and it's a good website if you want to learn about it in-depth.
One of the things that I learned is that Check Point firewalls also use Linux commands. After working with Check Point, I improved my Linux skills, which is a good thing for me.
I would rate this solution a nine out of ten.
The main use case is Firewall provisioning and integration with Tufin and Skybox. Also, we focus on firewall compliance, rule review, VPN configuration, and network troubleshooting.
Working for one of the largest companies, I found that using Check Point has made firewall provisioning very easy for us, and integration with the above-mentioned tools has eased the process of PCI audit, security compliance, and rule recertification.
I think the VSX has been the most valuable feature for us. We use it for tunnel management, which is great. The configuration has been quite straightforward.
Debugging could be improved when compared to the competition.
I think the product release lifecycle should be improved.
We have been using Check Point NGFW for almost eight years.
Previously, we used Cisco ASA. We switched because of the fact that Check Point offers more stability and visibility into the firewalls. Management is easier, especially using the GUI version.
I think that the pricing is different for every organization.
We did evaluate Juniper, as well.
We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.
The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily.
The frequency of the antivirus updates which we get for Check Point firewalls should increase. They should be of good quality compared to the competitive firewalls on the market. They should give us stable antivirus signatures. That is an area in which they can improve.
I have been using Check Point's Next Generation Firewalls for the last three-and-a-half years.
These firewalls are very stable and, apart from the antivirus issue which I mentioned, everything is stable in them. The best thing is that they are the most advanced firewall on the market.
Per my experience, it is very easy to scale these firewalls, because they are combined with the central management point. It is very easy to push the same configuration to different firewalls at the same time. It does not take much time to extend usage.
We use them throughout our organization. Currently we have used them for around 50 percent of our needs and there is definitely a room to grow. In the future we will definitely try to increase usage, if it is required.
We have had a good experience with the Check Point support guys. The solutions they provide are very straightforward and are provided quickly.
I used Palo Alto firewalls. Compared to Palo Alto we are happier with the Check Point Firewall features. Key differences are the ease of operating Check Point firewalls and the use of Linux, as we are all trained in Linux. It is easier for us to work on the ELA of Check Point firewalls. And Check Point's support is good.
Check Point is the best firewall we have found for our organization so we went with it.
In our company we do setup of Check Point firewalls very frequently because we are a growing company and we are required to do them on a fresh basis for our new branches.
The initial setup for these firewalls is straightforward. There's nothing complex about Check Point firewalls. They are easy to install and configure. We have cloud-based VM firewalls. We configure them in our environment. It is easy to access them and it is also easy to implement the changes on them.
Deployment time depends on the condition and the space of the organization. In our case, it requires three to six months for the setup phase. We have the same implementation strategy for all our branches, which is very simple. It is a three-level hierarchy which is recommended by Check Point. We use the SmartConsole, we use the Security Gateway, and we use the Security Management Server.
In my organization there are six people who have the access to the Check Point firewalls. Two of them are network administrators and four are managers.
We are happy with the return on investment from the Check Point firewalls. We are happy with the features and with the protection they provide us.
The licensing part is easy for Check Point firewalls. You just purchase the license and install it on the firewall. The pricing is a bit high, but obviously it gives you advanced features. If you want to buy the best thing on the market, you have to pay extra money.
When implementing the product, follow the recommendations which Check Point provides. Follow the backup for the firewall so that in case of an issue, you have a secondary firewall active.
The biggest lesson I have learned is that there is a scope of improvement. Companies that are improving and providing updates frequently are growing more. In addition, improving support is a very key part of things. Check Point rates well on all these points.
