What is our primary use case?
In addition to providing zero-day protection in a very good way.
It also helps a lot with the sandboxing feature which extracts malicious files, analyzes them before delivering them to the client, and if there is no threat, it delivers them without affecting the user's use.
This feature is widely used in our Check Point Harmony Endpoint since it is the one that keeps the most modern vulnerabilities updated. Its quality of validating with the other Check Point tools worldwide to generate an updated and robust collaboration database is incredible.
How has it helped my organization?
With Check Point ThreatCloud, it has helped us a lot in providing our company. It is honestly incredible. Other manufacturers are not as effective as CheckPoint. They are adding more and more features to improve security.
We have managed to reduce almost 100% of the attacks on our company. The reports and logs have also helped us to see the areas of improvement in order to have a protected environment.
Headquarters and management feel more protected with Check Point. Their ways of attacking vulnerabilities generate a lot of confidence.
What is most valuable?
Almost all Check Point security features are amazing. I'd recommend it for security.
However, the ones that seem remarkable to us are the sandboxing. It offers a fast way of analyzing and later making the decision if the file is a threat is very good.
The collaborations between Check Point security devices globally are great. There, modern and zero-day threats are reviewed and pushed to the other devices to safeguard security incredibly quickly. This is unique. It's an excellent feature.
What needs improvement?
In Check Point, almost everything is incredible. However, we believe that there are areas for improvement,
This tool can improve the level of use in all Check Point tools. In some, it is not available yet.
The documentation for the most modern applications of the manufacturer is sometimes not well done or complete. Sometimes guides are followed, and the objective is not achieved. Then, it is necessary to open a support case with Check Point to be able to solve or accelerate an improvement in the implemented product.
For how long have I used the solution?
This Check Point technology integrates and helps many manufacturer tools to provide protection. In general, it helps the tools we use through the Infinity Check Point portal for more than a year and a half through the security tools of Check Point.
Which solution did I use previously and why did I switch?
We have not seen a security capacity equal to that of Check Point in other manufacturers. Cloud threat has no competition for us.
What's my experience with pricing, setup cost, and licensing?
At the cost level, this feature is not isolated from the security tools. It is included, so it is important to always check with a vendor the cost of the tool, its included features, and that they fit the user's budget.
Which other solutions did I evaluate?
There is not much to say. Check Point's capacity in its products generates great security confidence. Thanks to this, it is easier every time to choose Check Point security.
What other advice do I have?
Validate, test, and read about Check Point products. They are getting better and better. I'd recommend it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.