Try our new research platform with insights from 80,000+ expert users
Vishal Koovaparam  - PeerSpot reviewer
Server Security Analyst and Solution at a outsourcing company with 11-50 employees
Real User
Top 5
Nov 10, 2025
Has streamlined gateway management and freed up internal IT resources
Pros and Cons
  • "Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console."

    What is our primary use case?

    My main use case for Check Point Security Management is to configure and manage our security gateway.

    A specific example of how I use Check Point Security Management to manage our security gateway is that we have a head office and a branch office with an HA firewall of Check Point integrated with this security management product. All configuration, reporting, and any tasks related to the security gateway are completed through the security gateway.

    What is most valuable?

    The best features Check Point Security Management offers are its manageability and the easy user interface from where I can configure or manage multiple security gateways.

    When I mention manageability and the user interface, it stands out to me because it is easy to trace any tabs to configure anything, making it very reliable.

    Check Point Security Management has positively impacted my organization because our IT person is not always busy with troubleshooting or manageability after deploying this solution, as they can manage multiple security gateways from a single console.

    It is saving our time, and we can do multiple things related to IT right now, with one single person doing multiple things after this deployment.

    What needs improvement?

    Check Point Security Management is working as per my requirements, so I don't see anything lacking in this solution. It is perfectly working for my organization.

    For how long have I used the solution?

    I have been using Check Point Security Management for more than two and a half years.

    Buyer's Guide
    Check Point Security Management
    January 2026
    Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    879,899 professionals have used our research since 2012.

    What do I think about the stability of the solution?

    Check Point Security Management is stable in my experience, as I don't see any issue or downtime. It is perfectly stable and working till now.

    What do I think about the scalability of the solution?

    Check Point Security Management is currently handling my five or six gateways. From the scalability perspective, I can't say much because we have a limited number of branches, and it is handling that.

    How are customer service and support?

    My experience with Check Point Security Management's customer support has been positive, as they are very helpful in each and every technical aspect and able to resolve complex issues within the timeline. I am very much happy with their support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We are using Check Point Security Management only. I did not previously use a different solution.

    How was the initial setup?

    Before implementing Check Point Security Management, I was very worried about the initial integration part. However, that part was very easy because there are multiple KBs available from Check Point, and it is very straightforward to integrate. We didn't face any challenges with this solution.

    What about the implementation team?

    I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.

    What was our ROI?

    The return on investment with Check Point Security Management is clear because it helps save time and money. One person is now working for multiple things related to IT, whereas previously we had multiple engineers involved for different tasks. After this deployment, one engineer can handle multiple things.

    What's my experience with pricing, setup cost, and licensing?

    I was not part of the team who handles the pricing, setup cost, and licensing for Check Point Security Management.

    Which other solutions did I evaluate?

    Before choosing Check Point Security Management, I evaluated other options like FortiGate and others.

    What other advice do I have?

    I would rate Check Point Security Management a nine out of ten. I chose nine out of ten because it is working very fine till now, and it might be in the future that I can see anything lacking inside, which is why I am not giving ten out of ten.

    I would advise anyone looking into using Check Point Security Management, especially those having multiple security gateways and multiple branches using Check Point firewall, to consider it as the best centralized management solution. From this solution, reporting, all the security gateway management, and troubleshooting can be done easily, which will be very helpful for them. My review rating for Check Point Security Management is nine.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Nov 10, 2025
    Flag as inappropriate
    PeerSpot user
    Technique at a outsourcing company with 11-50 employees
    Real User
    Top 5
    Oct 16, 2025
    Centralized management has improved productivity and streamlined network configuration
    Pros and Cons
    • "After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier."
    • "It can be improved because sometimes it lags when accessing the management gateway."

    What is our primary use case?

    Our main use case for Check Point Security Management is to centrally manage our multiple gateways to push any configuration centralized.

    What is most valuable?

    A standout feature of Check Point Security Management is its user-friendly interface, which is easy to understand, and we can easily generate custom reports to present to our management team.

    In terms of custom reporting, we generally generate reports such as top 10 or top 20 users consuming more bandwidth or top 10 risky users, helping us have visibility into users accessing malicious websites or security events that happened recently.

    After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.

    I have noticed that it has reduced errors because when configuring through the security management, a single configuration is pushed to all gateways, saving time and reducing mistakes.

    What needs improvement?

    It can be improved because sometimes it lags when accessing the management gateway.

    For how long have I used the solution?

    I have been with my current organization for more than four years, and I have more than 10 years of experience in this field.

    What do I think about the stability of the solution?

    Check Point Security Management is stable, but there are some lags.

    What do I think about the scalability of the solution?

    The scalability is outstanding and handles growth and increased demand very well.

    How are customer service and support?

    The support team is outstanding, helping us with troubleshooting when we require technical support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before choosing Check Point Security Management, we evaluated Fortinet.

    How was the initial setup?

    We have been using Check Point Security Management since the start.

    What was our ROI?

    After deploying the security management, our time has been saved, and we require fewer engineers, allowing a single team to handle all security gateways, saving costs at the management level.

    What's my experience with pricing, setup cost, and licensing?

    The setup cost and pricing are a little concerning, but considering the features and stability of the devices, they are outstanding.

    What other advice do I have?

    If anyone has more than one branch and multiple security gateways, they should definitely consider Check Point Security Management or a cloud-based solution to manage all security gateways easily.

    Everything looks perfect right now.

    On a scale of 1-10, I rate Check Point Security Management an 8.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Oct 16, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Security Management
    January 2026
    Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    879,899 professionals have used our research since 2012.
    IT admin at a manufacturing company with 51-200 employees
    Real User
    Top 5
    Aug 27, 2025
    Improved organizational security and efficiency with intuitive management
    Pros and Cons
    • "The best feature Check Point Security Management offers is the GUI, which shows everything in different categories such as mobile phones, connected devices, laptops, and desktops, making it easy to understand what is connected to what."
    • "They need to change the support resolution time."

    What is our primary use case?

    My main use case for Check Point Security Management is as a firewall. I have connected it in my office premises as a firewall. The people who connect to the internet in the internal network have their packet captures go through the firewall itself, ensuring everything is safe and secure.

    What is most valuable?

    The best feature Check Point Security Management offers is the GUI. The GUI shows everything in different categories such as mobile phones, connected devices, laptops, and desktops. It displays everything in different dashboards, making it easy to understand what is connected to what.

    Having that dashboard helps me in my day-to-day work because it saves time. It shows all the devices that have been connected and how many devices are connected in different ways. Through this, I am able to track how many laptops and mobile phones have occupied my IP addresses.

    What needs improvement?

    If I had to pick one thing that could make my experience even better, I would say they need to change the support resolution time. Everything else meets expectations.

    For how long have I used the solution?

    I have been using Check Point Security Management for 1.8 years.

    What do I think about the stability of the solution?

    Check Point Security Management is stable in my experience with no downtime.

    What do I think about the scalability of the solution?

    Regarding scalability, I have given the rating of nine out of ten. The support is the only aspect having a glitch; everything else is satisfactory.

    How are customer service and support?

    I choose a nine out of ten specifically because sometimes the support has a glitch.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    I used a different solution before but prefer not to disclose that name. Currently, there are no issues with anything, and everything is functioning properly.

    What was our ROI?

    I have seen a hundred percent return on investment with Check Point Security Management.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Check Point Security Management is positive. The products they provide from Check Point are reasonably priced and satisfactory.

    Which other solutions did I evaluate?

    Before choosing Check Point Security Management, I did not evaluate other options. I chose only one option, which is Check Point.

    What other advice do I have?

    My advice to others looking into using Check Point Security Management is to ask all vendors and customers to take the demo for five to 10 times. After ensuring it is supported by their organizations, then proceed forward. I rate Check Point Security Management a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Aug 27, 2025
    Flag as inappropriate
    PeerSpot user
    Abhijeet Chaskar - PeerSpot reviewer
    Cyber Security Analyst at a outsourcing company with 11-50 employees
    Real User
    Top 5
    Dec 17, 2025
    Centralized security management has improved visibility and reduced configuration errors
    Pros and Cons
    • "Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways."

      What is our primary use case?

      I am using Check Point Security Management in our day-to-day operations to centrally manage all Check Point Security Gateways within my organization. All of these Check Point Security Gateways are integrated into security management, and from there, I push configuration, reporting, and logging. All firewall activity is managed from the central console of Check Point Security Management.

      Our day-to-day activities involve updating firewall policies and security profiles, such as antivirus and anti-spyware. All of these configurations and firmware upgrades for the firewall are completed from Check Point Security Management.

      What is most valuable?

      Based on my experience with Check Point Security Management, it is an excellent solution for managing all security gateways from a central console where I can access all logs and security events triggering on different security gateways. I have a single console where I can monitor and configure everything, allowing me to manage everything from security management to all firewalls from a central console.

      The best aspect about the centralized control of Check Point Security Management is that it streamlines all configurations across all location firewalls. I have all logs from all firewalls at a single pane of glass where I can filter and check all security events occurring over any number of days I select. I am gaining good visibility over the network, over the cyber threats triggering, and the compliance of the configuration.

      Based on my experience, we now have configuration hardening across all branches, and there is no mismatched configuration between the branches. We do not need to communicate with other branches' engineers. We have a single centralized team for security managing all of the organization's Check Point Security Gateways.

      It benefits everyone. My configuration errors have been reduced, compliance has improved, and it is saving my team time. We are achieving all three of these benefits.

      What needs improvement?

      Based on my experience with Check Point Security Management, I do not see anything lacking. It is currently managing all the gateways, and we are able to achieve what we want from our perspective. I am not seeing anything that needs to improve right now, but in the future, it might be upgraded with additional AI features and automation.

      For how long have I used the solution?

      We have been using Check Point Security Management for more than three years.

      What do I think about the stability of the solution?

      Check Point Security Management is stable in my experience.

      What do I think about the scalability of the solution?

      As of now, there is no issue with the scalability of Check Point Security Management regarding my organization's needs.

      How are customer service and support?

      The customer support team for Check Point Security Management is excellent. They provide technical support whenever I require it.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      The selection of Check Point Security Management was not done by my team; it was completed by a different team. I do not have any information about previous solutions.

      What other advice do I have?

      I advise anyone having multiple security gateways that are managed stand-alone to deploy Check Point Security Management and manage all security gateways from a central console and central team. This will minimize configuration errors and reduce the requirement of engineers. I rate Check Point Security Management a nine on a scale of one to ten.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
      Last updated: Dec 17, 2025
      Flag as inappropriate
      PeerSpot user
      Inside Sales Manager at a outsourcing company with 11-50 employees
      Real User
      Top 5
      Oct 27, 2025
      Centralized configuration has saved time and improved security visibility across all gateways
      Pros and Cons
      • "The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it."
      • "The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference."

      What is our primary use case?

      We are using Check Point Security Management to centrally push the configuration to our security gateway, and we are using this solution to upgrade patches and firmware updates to our security gateway devices.

      We have upgraded our security gateway from central management using Check Point Security Management, eliminating the need to log in to each security gateway device individually. We simply push the upgrade firmware version from centralized management, and it upgrades from there.

      With central management of Check Point Security Management, we track all employees connected to our network to prevent security breaches or issues. All these features can be implemented from centrally management with the help of visibility.

      What is most valuable?

      The best feature of Check Point Security Management is centralized management and login, making it an easy job for engineers to configure and manage it.

      After implementing the management of devices using Check Point Security Management, it became very easy and we are getting full visibility.

      Time savings have been significant because with Check Point Security Management, our engineers spend less time managing or configuring the security gateway. We simply log in from central management to push changes to multiple security gateways easily.

      What needs improvement?

      The initial configuration and setup knowledge base document for Check Point Security Management could be upgraded to make it more helpful for configuration reference.

      Apart from the knowledge base improvements needed, everything is very useful and meaningful in Check Point Security Management.

      For how long have I used the solution?

      I have been using Check Point Security Management for almost three years.

      What do I think about the stability of the solution?

      Check Point Security Management is stable.

      What do I think about the scalability of the solution?

      Check Point Security Management is good in terms of scalability. We can add more gateways, and it handles them very easily.

      How are customer service and support?

      I have had a great experience with the support team of Check Point Security Management. They are supportive and very knowledgeable. When we face technical issues, they are ready to help us.

      How would you rate customer service and support?

      Positive

      What's my experience with pricing, setup cost, and licensing?

      Regarding pricing, setup costs, and licensing for Check Point Security Management, we have not faced any challenges. Everything was as per expectation and costing.

      Which other solutions did I evaluate?

      We evaluated Fortinet FortiManager before choosing Check Point Security Management.

      What other advice do I have?

      Anyone looking for a centralized management solution can consider Check Point Security Management as one of the most valued solutions that will really help them to centrally manage all security gateways. I rate Check Point Security Management nine out of ten.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
      Last updated: Oct 27, 2025
      Flag as inappropriate
      PeerSpot user
      Abnet Tsegaye Belay - PeerSpot reviewer
      Cybersecurity Engineer at a tech services company with 11-50 employees
      Real User
      Top 5Leaderboard
      Sep 24, 2025
      Has unified access control and policy management while improving operational efficiency
      Pros and Cons
      • "Check Point Security Management server centralizes our policy management by unifying the firewalling features and threat prevention features to manage it in one console."
      • "When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult."

      What is our primary use case?

      We need central management for our policy, monitoring, and different day-to-day administrative tasks, so Check Point Security Management fits all the requirements for our needs. As we know, Check Point Security Management can be used for central policy management. It is an all-in-one management system. We can manage firewalling, application control, URL filtering, IPS, Anti-Bot, and Threat Emulation. We can unify the rule base and reduce it in one central management console called SmartConsole. That is our main use case for this product.

      I can use one console for access lists, application control, managing day-to-day reporting, granular access control, managing large and segmented environments with multiple domains or customers, and integrating threat management with that console. It has summed up the tasks in one console, which is our specific use case.

      We can manage one firewall in one site, one cluster in one of our sites, and another cluster in another site with a single console. This feature allows us to manage large and sophisticated management tasks in one console, which is why it is called Multi-Domain Security Management.

      What is most valuable?

      The granular and general access control allows us to centralize our policy management in one console for firewall, application control, URL filtering, IPS, Anti-Bot, Threat Emulation, and Threat Extraction. It is unified in one console, allowing us to unify the rule base to reduce complexity. These features are beneficial, and the system is scalable.

      Administrators are operational, so it creates operational efficiency through faster rollouts of change with policy packages, creating faster and easier operational day-to-day activities.

      I strongly admire the compliant support feature. It creates detailed logs, audit trails, and customizable reports. It has excellent reporting features including the threat blades, threat prevention blades, and firewalling blades. I can comply with this and provide it for auditors, which makes it an interesting feature.

      What needs improvement?

      Performance with logs needs improvement as Check Point Security Management has large-scale environments that need dedicated log servers. If you store logs on the central management server or Check Point SMS, it will create resource-intensive tasks. When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult. This needs to be improved. Additionally, the resource demands need improvement. For example, log indexing related to SmartEvent needs strong servers, which should be improved for the future.

      For how long have I used the solution?

      I have been deploying Check Point Security Management products for almost three years.

      What do I think about the stability of the solution?

      It is stable for our clients.

      What do I think about the scalability of the solution?

      It is scalable because it can manage different gateways or different firewalls in different sites. It can be multi-domain Security Management server and can manage large or segmented environments with multiple domains or customers.

      Which solution did I use previously and why did I switch?

      For management, we did not use another solution. We just used Cisco ASA on that single firewall which can be managed through CLI. We switched from Cisco ASA, but that was not management; it was a firewall.

      Which other solutions did I evaluate?

      We considered other vendors such as FortiGate and Palo Alto firewalls. We chose Check Point Security Management server because we selected Check Point for our firewall.

      What other advice do I have?

      I rate Check Point Security Management nine out of ten because it has good features. I decreased one point due to the performance and resource demanding issues on the log indexing, and SmartEvent needs strong servers, which needs to be considered.

      It is deployed on-premises and is not costly. The management server can be expensive, but it excels at what it does.

      Check Point Security Management server centralizes our policy management by unifying the firewalling features and threat prevention features to manage it in one console. It creates ease and operational efficiency. We save time and increase our day-to-day operational efficiency by removing management complexity.

      If you want to centralize your policy management such as firewalling, application control, URL filtering, and different threat prevention features, and unify your rule base to reduce operational complexity, you need to use Check Point Security Management.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller, Partner
      Last updated: Sep 24, 2025
      Flag as inappropriate
      PeerSpot user
      networke1856865 - PeerSpot reviewer
      Network Engineering and IS Access at a comms service provider with 5,001-10,000 employees
      Real User
      Top 20
      Aug 25, 2025
      Centralized management of extensive firewall infrastructure reduces errors and saves time
      Pros and Cons
      • "Check Point Security Management has positively impacted my organization by saving a lot of time because we have a lot of firewalls, and it provides a console where I can see directly all the managed firewalls, allowing us to manage all of our firewalls from just one point."
      • "I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation."

      What is our primary use case?

      My main use case for Check Point Security Management is to manage about 500 Check Point firewalls, and we manage all this equipment with this solution.

      In my day-to-day work, I manage typical tasks with Check Point Security Management such as policy updates, monitoring, and troubleshooting, and it's easy to manage all the firewalls in this big environment with this solution.

      I do not have anything else to add about my main use case or how I use Check Point Security Management.

      What is most valuable?

      In my opinion, the best feature Check Point Security Management offers is the ability to upgrade firewalls directly from the management console of the security management, which stands out to me.

      Being able to upgrade firewalls directly from the management console makes a big difference for me because it reduces errors, and we do a lot of things automatically, which improves the upgrade process.

      Check Point Security Management has positively impacted my organization by saving a lot of time because we have a lot of firewalls, and it provides a console where I can see directly all the managed firewalls, allowing us to manage all of our firewalls from just one point.

      What needs improvement?

      I have used Check Point Security Management for several years and have seen its evolution, and I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation.

      The improvements I would like to see in the API specifically relate to ease of use because the REST API is not easy to use.

      For how long have I used the solution?

      I have been using Check Point Security Management for more than 13 years.

      What do I think about the stability of the solution?

      Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades, but after the upgrade, the platform is very stable.

      How are customer service and support?

      I have reached out to customer support for Check Point Security Management many times, and they answer quickly, with the level of support depending on the difficulty of the problem.

      Which solution did I use previously and why did I switch?

      Before using Check Point Security Management, I used a Cisco solution, and we switched to Check Point because Cisco management was not user-friendly, had a lot of bugs, and was very difficult to use.

      What was our ROI?

      I can't respond to how much time I've saved or how many incidents have been reduced since I started using Check Point Security Management because I'm pretty sure we saved a lot of time due to the central point of this tool, but I can't share examples.

      I have not seen a return on investment in terms of time saved, fewer employees needed, or other benefits since I cannot share any relevant metrics.

      Which other solutions did I evaluate?

      We use Fortinet and Cisco as other tech products.

      What other advice do I have?

      My advice to others looking into using Check Point Security Management is that if you're looking for an easy tool to manage your firewall, you have to use this tool.

      I do not have any additional thoughts about Check Point Security Management before we wrap up.

      On a scale of one to ten, I rate Check Point Security Management a ten.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      Last updated: Aug 25, 2025
      Flag as inappropriate
      PeerSpot user
      Senior Network Engineer at a healthcare company with 10,001+ employees
      Real User
      Top 5
      Jul 27, 2025
      Unifies security policies and streamlines rule updates across sites
      Pros and Cons
      • "Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors."
      • "I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes."

      What is our primary use case?

      My main use case for Check Point Security Management is to unify firewall and threat prevention policies across multiple international sites, so I use SmartConsole to streamline rule updates and monitor security events in real-time.

      What is most valuable?

      The best features Check Point Security Management offers me are unified management console, automated policy management, and real-time monitoring and reporting.

      Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time, and by enabling faster policy updates, which allowed quicker roll-out of rule changes across multiple sites, improving agility and reducing configuration errors.

      What needs improvement?

      I see areas of improvement for Check Point Security Management such as GUI stability and performance, and simplified firmware upgrades.

      I and my colleagues occasionally report glitches or missing data views with the GUI stability and performance issues, and sometimes SmartConsole crashes.

      The main things regarding needed improvements are GUI stability and performance, and there is no need to add more.

      For how long have I used the solution?

      I have been using Check Point Security Management for five to six years.

      What do I think about the stability of the solution?

      Check Point Security Management is stable, although sometimes it is not.

      What do I think about the scalability of the solution?

      Check Point Security Management is scalable.

      How are customer service and support?

      The customer support for Check Point Security Management is good.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      I did not previously use a different solution before Check Point Security Management.

      What was our ROI?

      I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.

      Which other solutions did I evaluate?

      I did not evaluate other options before choosing Check Point Security Management.

      What other advice do I have?

      My advice for others looking into using Check Point Security Management is that if you manage complex or multi-site networks, it is a powerful tool for centralizing control and improving security consistency.

      I don't have specific metrics or examples of time saved, fewer errors, or other measurable benefits.

      I don't have information regarding pricing, setup cost, and licensing.

      My company does not have a business relationship with this vendor other than being a customer.

      I was offered a gift card for this review.

      On a scale of one to ten, I rate Check Point Security Management an eight.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      Last updated: Jul 27, 2025
      Flag as inappropriate
      PeerSpot user
      Buyer's Guide
      Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.
      Updated: January 2026
      Buyer's Guide
      Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions.