Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
High catch rates, automated forensic data analysis, and great machine learning capabilities
Pros and Cons
  • "Review of exported and imported packages and protection and content filtering have been useful."
  • "In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."

What is our primary use case?

It was installed on the machines of the organization due to the need to filter all the incoming and outgoing content and to protect the teams - mainly our units that use laptops and have to be constantly moving. 

In the last two years with the appearance of Covid-19, this solution gave us that protection outside the organization that had been neglected for strengthening internal security. 

Another great advantage is the possibility of being able to protect our mobile devices by integrating the solution into all mobile devices.

How has it helped my organization?

The solution has given us an additional layer of protection in our equipment and applications, mainly now that the equipment is portable and in many cases, we must connect to various public Wi-Fi networks.

Its Granular Access Control over and within each resource, based on dynamic and contextual evaluation of user attributes and device states is great. 

A broad set of rules can be applied across all users, servers, and enterprise data stores, including user commands and database queries - giving users well-managed access.

What is most valuable?

Review of exported and imported packages and protection and content filtering have been useful. 

Advanced behavior analysis and machine learning algorithms shut down malware before it does damage. 

The solution offers high catch rates and low false positives to ensure safety,
efficacy, and effective prevention.

The automated forensic data analysis delivers insights into threats. 

Complete attack containment and remediation can quickly restore any infected system. 

It blocks malware coming from web browsing or email attachments before it reaches the endpoints. 

What needs improvement?

It is important to locally validate the consumption exerted on the equipment. At times, when I lose connection, I feel that the equipment is slowing me down. They could improve this detail or indicate that the application, while it is being restored, can generate latency in the communication processes. That said, it is definitely a very good solution for the protection layer in teams inside and outside the organization. 

In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity.

Buyer's Guide
Check Point Quantum SASE
April 2024
Learn what your peers think about Check Point Quantum SASE. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,886 professionals have used our research since 2012.

For how long have I used the solution?

I have been using the solution for two years and it really works.

What do I think about the stability of the solution?

It is very stable and normally any problems generated are from loss of internet.

What do I think about the scalability of the solution?

Scaling is easy and fast, thanks to the fact that it is licensed.

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

What's my experience with pricing, setup cost, and licensing?

It is a quick solution to install, however, its cost is really medium and not low.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

It is perfect for keeping all my devices protected.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network & Information Security Expert at Malam-Team
User
Offer excellent anti-malware, URL filtering, and anti-ransomware features
Pros and Cons
  • "It's improved the security of every single OS in the organization as well as the visibility and security capabilities."
  • "More report and alert options would be useful."

What is our primary use case?

We use the EDR solution for servers and endpoints for a lot of customers. The use case is for offering protection at the OS level. 

We wanted a better solution than legacy antivirus to secure each OS in the organization. Harmony Endpoint gives us a complete security package with a lot of security features that regularly require a lot of separate security products and a lot of overhead management. 

The environments include on-premise servers - mostly Windows - as well as laptops and desktops with Windows and Mac OS. We also have some cloud services in Azure and AWS.

How has it helped my organization?

It's improved the security of every single OS in the organization as well as the visibility and security capabilities. With Harmony Endpoint, we give each computer advanced anti-malware protection and internet browsing protection (like proxy protection), and advanced phishing protection inside websites. 

It takes care of the concern about ransomware. Today, it's more important to secure each endpoint in the organization at the OS level rather than the organization network level as users are connecting from everywhere. This is why Harmony is so important to us.

What is most valuable?

The solution offers very good features including anti-malware, URL filtering, and anti-ransomware. The product offers a complete solution in one package and it's on every single OS. 

The most valuable part of this product is the complete security package in one single endpoint that includes the legacy anti-virus protection, advanced anti-malware protection, browsing protection, and even firewall capabilities at the OS level. 

In a lot of cases, when we want to give all these security features to every endpoint, we need to implement a lot of separate security products.

What needs improvement?

More report and alert options would be useful. The reports are not good enough and alerts are not usable. 

We need more user-friendly alerts and more options for the alerts. The reports are not capable of giving important information from some parts of the system - like inventory details, etc. 

Also, the logs in the product are not very usable. If you have any blocking of a legitimate app or some problem you will have a hard time finding a log about it and most of the time you will not find any information. 

The product doesn't have an automatic shutdown switch. You must uninstall it in order to shut it down.

For how long have I used the solution?

I've used the solution for about one year.

What do I think about the stability of the solution?

It's very stable. However, they need to resolve some bugs and feature requests.

What do I think about the scalability of the solution?

It's a cloud solution. We are using the cloud-managed solution which makes it very scalable.

How are customer service and support?

The solution offers the best customer service and support in the market.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Symantec and we wanted to move forward to an EDR solution that gives a more complete security solution for today's needs.

How was the initial setup?

The initial setup is very straightforward.

What about the implementation team?

We implemented it in-house. We learned how to do it by ourselves.

What's my experience with pricing, setup cost, and licensing?

There are only two types of licenses. If you don't need sandbox features, you can take the basic license and it includes everything.

Which other solutions did I evaluate?

We tried Sentinal ONE, CrowdStrike, Microsoft, Trend Micro, and McAfee.

What other advice do I have?

It's the perfect solution for endpoint protection and has a lot of features included.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Quantum SASE
April 2024
Learn what your peers think about Check Point Quantum SASE. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,886 professionals have used our research since 2012.
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac
Real User
Top 5Leaderboard
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
  • "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
  • "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."

What is our primary use case?

We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.

How has it helped my organization?

The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.

What needs improvement?

While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.

Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. My company has 1000 users. 

How are customer service and support?

The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.

How would you rate customer service and support?

Positive

How was the initial setup?

My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.

As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete. 

What's my experience with pricing, setup cost, and licensing?

The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.

What other advice do I have?

I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
User-friendly, easy to install, and helps with monitoring
Pros and Cons
  • "One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
  • "The support is not very good."

What is our primary use case?

It was implemented at work to be able to monitor collaborators and know what pages they are using and thus be able to take the necessary actions to block pages that are not authorized in the company and also know in which pages collaborators spend more time and be able to measure their work performance and thus be more effective in our company, on the other hand it helps a lot to improve the traffic and performance of the network, which is one of the points where it helps a lot.

Once all the security breaches of our collaborators have been detected, we can determine which options to mitigate in the company and improve security.

How has it helped my organization?

Harmony has improved the organization in being able to better monitor the use of internet bandwidth, accesses, pages, restrict pages, and allow sites, however, it has also been found that it makes machines a bit inefficient, this is because the program consumes many resources of the device where it is connected, sometimes causing slowness and starting to see many jams in the programs or processes that are being executed.

It has also been possible to determine that, for use on a Mac PC it is not very complicated to do the installation. You must have very robust equipment.

What is most valuable?

One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way.

The panel configuration and agent installation on each of the machines is very practical and quickly distributed. Furthermore, all the equipment that does not have an agent installed can be viewed in the administration panel and have better control of each of the devices.

Another valuable characteristic is the configuration of reporting and information of each of the users. This report is quite complete, and it is possible to determine what actions to take in the organization and be able to present a report to high command.

What needs improvement?

One of the areas that must be improved is the ability to make the software less burdensome for the devices since they consume a lot of resources which makes it necessary to make an economic investment in the device itself such as servers, desktop laptops. that handle a relatively normal performance according to the functions it performs since, if used with a high-performance computer, Harmony behaves well and does not cause slowness.

This made us uninstall the product on several collaborating machines since the PC's performance dropped a lot. Some programs, like Teams, do not work and this causes us problems where we cannot monitor those machines.

For how long have I used the solution?

He used the product for 5 years.

What do I think about the stability of the solution?

The stability is very good, however, it harms a little of the performance of the PC.

What do I think about the scalability of the solution?

The scalability has been very good, it has helped us a lot to be able to improve our company.

How are customer service and support?

The support needs to improve lately it is very average they do not respond quickly they do not always comply with the SLA

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

Implementation is now easier since we have considerable experience using the tool.

What about the implementation team?

The installation was carried out with the tool vendor since we did not have much knowledge, today we have managed to have that learning curve and we have been able to do our own installations.

What was our ROI?

The investment in a security product will always have a return, not directly economical, but indirectly since all our information is secured.

What's my experience with pricing, setup cost, and licensing?

The cost is very accessible and the installation is very easy to implement.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

It is very user-friendly. The panel is easy to use.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
An easy-to-use and set-up cloud solution for security
Pros and Cons
  • "The tool is easy to use and set up."
  • "The product has a reasonably high pricing."

    What is our primary use case?

    We use the solution for security.

    What is most valuable?

    The tool is easy to use and set up.

    What needs improvement?

    Harmony Connect has two components: one for accessing the internet and the other for accessing the corporate network. The Access intelligence lab is particularly useful because it eliminates the need to purchase a separate firewall for the branch office. Instead, you can connect the Check Point VPN, providing you with Check Point Harmony Connect firewall functionality for monitoring traffic.

    The setup is easy, but it depends on the router configuration. The router configuration, in turn, will depend on the specific releases. The configuration could be improved.

    For how long have I used the solution?

    I have been using Check Point Harmony Connect for two to three years.

    What do I think about the stability of the solution?

    The product is stable.

    What do I think about the scalability of the solution?

    What are your impressions of the scalability of this solution?

    The solution is scalable.

    Which solution did I use previously and why did I switch?

    Since I trust the Check Point security, I trust Harmony Connect.

    How was the initial setup?

    The initial setup is easy and may take a half hour to complete if you’ve experience.

    I rate the initial setup a ten out of ten, where one is difficult and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product has a reasonably high pricing.

    What other advice do I have?

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
    Flag as inappropriate
    PeerSpot user
    Founder at Softnetx
    Real User
    Top 5
    Along with an excellent UI, the solution also provides a good UX
    Pros and Cons
    • "Check Point provides high-quality technical support. The support was pretty quick."
    • "Automation and scalability are areas where the solution lacks and needs to improve."

    What is our primary use case?

    Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.

    What is most valuable?

    I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.

    What needs improvement?

    Automation and scalability are areas where the solution lacks and needs to improve.

    For how long have I used the solution?

    I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.

    What do I think about the stability of the solution?

    The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.

    What do I think about the scalability of the solution?

    There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.

    The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.

    In the next release of the solution, I would like to see more automation features.

    The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.

    How are customer service and support?

    Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.

    How was the initial setup?

    I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.

    The solution is deployed on the cloud.

    The initial deployment was done using Check Point's UI for us, so it was five hours.

    Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, I can say that the more the number of users, the less they have to pay.

    What other advice do I have?

    I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.

    I rate the overall solution a nine out of ten.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: My company has a business relationship with this vendor other than being a customer: partner
    PeerSpot user
    Mitesh D Patel - PeerSpot reviewer
    Senior Technical Consultant- Cyber Security at Ivalue Infosolution
    Real User
    Top 5Leaderboard
    Offers great performance and reliability
    Pros and Cons
    • "The product's initial setup phase is very simple."
    • "When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."

    What is our primary use case?

    In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.

    What needs improvement?

    When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end. There are no OEMs in the market that provide 100 percent security. The security of the product has to be improved.

    For how long have I used the solution?

    I have been using Check Point Quantum SASE for seven years.

    What do I think about the stability of the solution?

    The product's stability is very good. Stability-wise, I rate the solution a nine out of ten.

    What do I think about the scalability of the solution?

    In firewall products, scalability is not required. If you set up the two firewall tools, no scalability is required. Scalability-wise, I rate the solution a nine out of ten.

    My company deals with 20 or 30 customers of the tool.

    My company's customers extensively use the product.

    How are customer service and support?

    The support from Check Point Quantum SASE is very good, and the response from the support team is fast. The support from Check Point Quantum SASE is customer-friendly and knowledgeable about troubleshooting issues.

    How was the initial setup?

    The product's initial setup phase is very simple.

    The product's installation process consists of racking, stacking, and mounting, after which a user can directly start the appliance and configure the HA status and policies.

    The solution is deployed on an on-premises model.

    The solution can be deployed in two or three days.

    One engineer is required to take care of one single deployment process.

    What was our ROI?

    The ROI of the tool can be calculated depending on the tool's ability to be used for multiple use cases and protect the confidential data of users. It is very simple to calculate the product's ROI. If you use Check Point Quantum SASE, then your internal users are protected from outside attackers.

    What's my experience with pricing, setup cost, and licensing?

    Check Point Quantum SASE provides SASE functionalities with all the required features. Check Point Quantum SASE's price is higher than what its competitors offer. The price of the product is something that depends on the requirements, and the purchase or order value of the customers.

    The price of the tool depends on whether customers need SMTP, NGTP, or Check Point NG licenses.

    I consider the product to be a medium-priced solution. There are no additional costs attached to the tool.

    What other advice do I have?

    The solution enhances the ability of our company's remote workforce to secure access to corporate resources since we use VPN to secure work-from-home users and domain users.

    Check Point Quantum SASE offers all the features essential for threat prevention, threat emulation, threat extraction, anti-spam, and anti-malware.

    In relation to Check Point Quantum SASE, I haven't worked with the part involving WAN architecture. I only handle cybersecurity for a portfolio with respect to the LAN segment, and not WAN segment.

    I rate the tool's performance a ten out of ten.

    Check Point Quantum SASE can be described as the world's best security product without a doubt since it is a market leader in its segment.

    The performance and reliability offered by the tool depend on the customer environment, and after considering aspects like throughput, how many users, and how many concurrent connections, my company plans the sizing part of the tool.

    The value of working with the tool is good, as it can secure users, environments, and applications.

    I rate the tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    Flag as inappropriate
    PeerSpot user
    Srini Krish - PeerSpot reviewer
    Business Development Sales Engineer at Orca Tech
    User
    Top 10
    Simple, easy to manage policies, and offers good reports
    Pros and Cons
    • "The reports give a simple overview of the traffic pattern within the organization."
    • "Branding could be better."

    What is our primary use case?

    The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. 

    We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. 

    Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.

    How has it helped my organization?

    We believe in defense in depth, and Harmony connect SASE adds another layer of protection for internet access. 

    We have already deployed the entire Harmony suite, from Email & Collab protection to Harmony Endpoint. This adds a layer on top. Being a mobile user, securing Internet access was very important, and the product's pricing was simple enough and unlike other multiple add-ons on top of the base products from other vendors.

    The reports give a simple overview of the traffic pattern within the organization. Though we don't use it to track user productivity, we can if necessary. There are reports specific to SaaS applications as well, which do come in handy.

    What is most valuable?

    The simplicity is good. It's good for consolidating security and being manageable from the Infinity portal with other Harmony solutions and makes management easy. We can use this instead of managing multiple-point solutions. It has a unified policy for private and internet access, making it easier to manage policies. 

    The weekly reports have been informative as well. We are also keen on trying clientless access to provide restricted access to applications for third-party users.

    Deployment was a breeze. We just key in the target users' email, and the rest is easy.

    What needs improvement?

    Branding could be better. Not many Check Point users realize there is a SASE offering at all. Policies could have layers as they do with their Firewalls, though I understand that's more of a functionality within the Smart dashboard. The threat prevention profiles like IPS, file, and URL protections could have more fine-tuning options.

    Though all the policies are managed from the Infinity portal, we still have to manually configure different solutions. It would be nice to know how the new XDR option will bridge this gap.

    Also, for Multi-factor authentication, there was an option for G-auth. However, I'm not sure about other forms of authentication they offer in their gateways. Bringing the backend closer to the gateway management would make it more granular.

    For how long have I used the solution?

    I've been using Harmony Connect for more than three months now. 

    What do I think about the stability of the solution?

    We haven't had any glitches or issues with it at all. It's very transparent to the user.

    What do I think about the scalability of the solution?

    It's very scalable and easy to deploy. It's scalable with users and it's scalable with the existing CP gateway deployments as well. There isn't much information on how it integrates with other end-point solutions. We had a full Check Point environment and it was clean.

    How are customer service and support?

    We haven't run into any issues so far. We did need some assistance during the initial policy configuration, and the Check Point solutions team was there to assist.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not use any other SASE offering before. 

    How was the initial setup?

    It's a simple setup; we just key in the end user's email address and it sends an invite to download the client. 

    What about the implementation team?

    We implemented it in-house with the assistance of Check Point's solutions team.

    What was our ROI?

    The ROI is better than using a traditional VPN to connect back to the office gateway. We needed something that was light and transparent without the hassle of having to connect manually. We aren't planning to remove the gateway yet, however, in the long run, we will consider it, and that should negate the gateway costs.

    What's my experience with pricing, setup cost, and licensing?

    Setup is a breeze. You key in the target user's email, and the rest is a click away. Pricing is competitive compared to the top players in the SASE market. 

    Also, there is no concept of add-ons which makes it easier. 

    Licensing with a minimum of 50 users could be a show-stopper for smaller organizations. However, a small company has probably got to do it with the infra in the backend to make it worthwhile.

    Which other solutions did I evaluate?

    Since we were keen on consolidating, we did not focus on multiple options.

    What other advice do I have?

    The product seems to be transparent to the users. It lacks application segmentation options which some competitors offer.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: We are Checkpoint Distributor as well but the comments are based on my experience with the product.
    PeerSpot user