Software Engineer at Doddle
User
Top 5
Good blocking and URL filtering with helpful support
Pros and Cons
  • "Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding."
  • "The learning curve is complex for new users."

What is our primary use case?

Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.

How has it helped my organization?

There have been reduced attacks from cyber criminals since we deployed this product. The security models enhance safe collaboration among teams and embrace teamwork. It has enabled the IT teams to set up a unified control system for tracking website performance. Implementation of set projects and tasks has been efficient with available resources. The deployed security services protect all the organization's employees based on the set company policies. Employees can focus on productive goals without fear of ransomware attacks.

What is most valuable?

URL filtering has shielded employees from engaging with unsafe browsing sites that can spread viruses. It provides red alerts when there is an attempt from an unauthorized user who may be accessing confidential information. 

The product blocks unsafe content from the internet that can affect internal data. 

Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding. 

Data Loss Prevention helps us to categorize and share data that is not harmful or can leak confidential data to the wrong personnel.

What needs improvement?

The set features have been guarding our websites against external attacks effectively. 

The learning curve is complex for new users. That said, with time, everything runs effectively. The cost of deployment and maintenance is high for SMEs. We have achieved most set goals as planned without failure. 

Antivirus features block trojans and harmful content from affecting workflows, and that has saved us a lot of money. 

Updates come late, sometimes exposing the organization to attacks that can affect operations. 

This product has good features that have been of great improvement overall.

Buyer's Guide
Check Point Web Gateway
April 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

Operations have been running effectively.

What do I think about the scalability of the solution?

The performance has always been stable.

How are customer service and support?

I am pleased with the customer support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with similar tools.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation took place through the vendor.

What was our ROI?

There is increased ROI from stable performance.

What's my experience with pricing, setup cost, and licensing?

The cost and setup depend on the size of the company.

Which other solutions did I evaluate?

This is the best tool that I have come across so far.

What other advice do I have?

For website security, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Prevents prevent data loss has good content filtering and offers good security
Pros and Cons
  • "It offers good security and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility."
  • "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."

What is our primary use case?

We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access. 

How has it helped my organization?

The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers. The evolution of technological attacks or hacks has become very innovative and sophisticated, which can make any organization vulnerable. However, we have come to feel safe implementing this type of solution as it has given us the protection that each one of us was looking for.

What is most valuable?

The Check Point Security Web Gateway service has the most beneficial features available for anyone. Among many of the things that we can highlight is the content filtering application control. Checking for antiviruses is enabled through the inspection solution. It offers good security, and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility.

What needs improvement?

The solution is quite complete and is very prominent. It is designed to be implemented for web services. We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment. If they could do this and provide the same connectivity, security, and efficiency that it has today for edge equipment, that would be ideal. If we could bring this service to mobile applications and applications directly installed on the device, we could expand and create a neural security network for all the devices we have.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Web Gateway
April 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Antonio Palhinhas - PeerSpot reviewer
Deputy Director of Information and CommuniDeputy Director of Information and Communication Systems at TVI
Real User
Top 20
Useful content filtering, reliable, and web options
Pros and Cons
  • "The most valuable features of Check Point Web Gateway are all the IPS. However, what matters for users is content and web filtering."
  • "Check Point Web Gateway could improve the user interface. It could be made more modern."

What is our primary use case?

Our primary use for Check Point Web Gateway is network security.

How has it helped my organization?

Being a media company the use of Internet is part of company's business, therefore it is very important to be able to protect both company assets and users. Check Point gateways provided an important role on that security measures.

What is most valuable?

One of the most valuable features of Check Point Web Gateway is the IPS capability. However, what matters most for users security is content and web filtering.

What needs improvement?

Check Point Web Gateway could improve the graphical user interface to make it more appealing. However it works.

For how long have I used the solution?

We have been using Check Point Web Gateway for approximately 10 years.

What do I think about the stability of the solution?

Check Point Web Gateway is a reliable and stable solution.

How are customer service and support?

Personally I do not have experience with the support of Check Point Web Gateway, but the team is happy with it. If there is no solution on their website the phone support usually works fine.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of Check Point Web Gateway was straightforward.

What about the implementation team?

We used the support for the deployment of Check Point Web Gateway.

We have a team of two people for the maintenance of the solution.

What other advice do I have?

My advice to others is for them to make sure they have the right model of Check Point Web Gateway they need for their business. The most inexpensive version might not have have the performance needed.

I rate the price of Check Point Web Gateway an eight out of ten.

There are some other solutions in the market with a bit better performance.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
An easy-to-deploy solution that most users desire because it fulfills their security needs
Pros and Cons
  • "The product covers all the security needs of roaming users."
  • "The support team’s response is not fast."

What is our primary use case?

Roaming users use the secure web gateway. We also use the tool for application filtering and web filtering.

What is most valuable?

The product covers all the security needs of roaming users.

What needs improvement?

The support team’s response is not fast. The product must improve its scalability and stability.

For how long have I used the solution?

I have been working with the solution for three years.

What do I think about the stability of the solution?

I rate the stability a nine out of ten.

What do I think about the scalability of the solution?

I rate the scalability a nine out of ten. We have more than 50 customers.

How are customer service and support?

Technical support is good. The support team’s response time is moderate.

How was the initial setup?

The solution is cloud-based. It is very easy to deploy the tool in the customer’s environment.

What about the implementation team?

The solution can be deployed within half an hour or one hour. We have an in-house team for deployment.

What's my experience with pricing, setup cost, and licensing?

Our customers pay a licensing fee annually or once in three or five years, per their requirements.

What other advice do I have?

I am using the latest version of the product. We sell the product. It is very easy to provide the price list and the features. I take care of the solution design and solution presentation to the customer. There are multiple OEMs for web gateways in the market. A set of customers use only Check Point. The ROI depends on the customer. Overall, I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
URL filtering and application control help us to secure against malicious websites and applications
Pros and Cons
  • "Application control allows the administrator to create granular policies based on users to allow, block, or limit access."
  • "Most of the time, we are struggling when it comes to getting support."

What is our primary use case?

We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites.

With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.

How has it helped my organization?

Check Point Web Gateway has improved our inbound and outbound traffic for applications or websites and related queries with features such as URL Filtering. It can control access to websites based on URLs to prevent employees from accessing malicious or inappropriate content and also we enforce bandwidth on streaming services.

These are very good features for us.

We can also now easily identify which users are accessing which URLs, and we can control access based upon them.

Application control allows the administrator to create granular policies based on users to allow, block, or limit access.

What is most valuable?

With Check Point Web Gateway, we have found the following features the most valuable:

  1. URL Filtering
  2. Application Control
  3. Antivirus

URL filtering allows us to control websites based on URL contents and whether any inappropriate content or any malicious content is there.

It allows us to enforce bandwidth restrictions on a specific destination or URL, where some streaming service content is available.

URL filtering management is based on the URL, users, and groups, where access can be either granted or denied.

What needs improvement?

Most of the time, we are struggling when it comes to getting support. Due to this, we have now have taken TAM support and have also taken third-party support for this product. Generally, the support experience is not what we expect from Check Point.  

For how long have I used the solution?

We have been using this solution for more than one year.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point is a very good solution, although the price and other licensing costs are something that you have to check.

What other advice do I have?

In summary, Check Point Web Security is a very good solution for us. We have been using it for a long time and we use all of the aspects. For security concerns, Check Point Web Security is the best solution with features such as URL filtering, application control, and antivirus.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Web GW - dashboards and helpful monitoring
Pros and Cons
  • "It's easy to deploy this tool."
  • "For the most modern versions, there currently is no documentation, or it is more difficult to find it."

What is our primary use case?

We needed to be able to filter traffic, to avoid consumption of resources, and to avoid loss of unnecessary bandwidth so we can use the resources correctly.

We needed to control sites since some consumptions do not represent and should not be allowed within the network by the company. Creating policies to be able to segment, allow, and block depending on the profiles created has been helpful.

We also needed to validate the access behavior through monitoring to determine what additional rules we could provide to improve security.

How has it helped my organization?

Check Point Web Gateway helped eliminate traffic and access to individual sites and granularly generate restricted access policies to maximize user efficiency without distractions outside of corporate work.

The protection against sites and accesses that have major threats. We are able to protect the equipment, information, and databases that are within the infrastructure, avoiding having any vulnerability accessible.

We like how the integrated product works with our Check Point gateways.

What is most valuable?

It's easy to deploy this tool. This has helped us to be able to implement it correctly. Additionally, this product generates trust with all Check Point technologies.

Its administration dashboards make it easy to use. It's a simple environment but offers great power in order to secure the perimeter.

The registration of logs and monitoring helps us to make accurate decisions to improve perimeter security.

There are also access control rules by categories previously established by the manufacturer. This is a very good feature.

What needs improvement?

An improvement that can be made at the manufacturer level is to be able to modernize the manuals and documentation more. There currently is no documentation for the most modern versions, or it is more difficult to find.

Also, they should improve the costs in order to have greater competition against other solutions. I am not saying that it is an overvalued tool. On the contrary, it is incredibly effective and safe, however, it could have price improvements to increase competition at the cost level compared to other manufacturers.

For how long have I used the solution?

This is a great integrated solution in our Check Point Gateway environment. We have been using them for a long time, approximately three years.

Which solution did I use previously and why did I switch?

Previously we had used open-source tools for these purposes. However, they did not have the power of Check Point.

What's my experience with pricing, setup cost, and licensing?

The only way to access the cost information of Check Point tools is through a partner. My recommendation is to look for a fairly specialized one so that they can provide all the help with implementation and cost estimates.

Which other solutions did I evaluate?

It is always important to evaluate the tools, both in documentation and function, and if it is possible to generate proof of concept. In our case, Check Point is successfully coupled to our environments, that's why it was used.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Used in Cloud, excellent option, modern and safe
Pros and Cons
  • "The implementation of this tool was straightforward."
  • "Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support."

What is our primary use case?

Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need. 

Then we were allowed to try this type of tool and see the results.      

Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.

How has it helped my organization?

The Check Point Web Gateway tool has helped us improve the security of the equipment and access that we previously had. Generally, a lot of malware was installed on the equipment, which without the user realizing it affected both the performance and the exposure of the information that they had access. After the implementation of Check Point, these threats disappeared little by little, improving through granular policies in which through user profiles we were attacking to solve them. It's been an excellent tool for us.

What is most valuable?

The features of Check Point Web Gateway that we liked the most are the following:

1- Monitoring. The monitoring provided by Check Point security technologies is very good, easy to understand, and helps in an excellent way to verify the behavior of the tool.

2- Granular Policies. Through granular policies, we were able to create different profiles that depended on the type of user. In some cases, it is more restrictive for normal users than for managerial users, that is, always mainly providing security. However, different restrictions helped us a lot. We could establish them without generating annoyance for the client depending on their role in the company.

3- Easy implementation. 

What needs improvement?

The aspects that we have evaluated over time to give an opinion on an improvement that the Check Point security manufacturer can generate are the following:

1- Improvement of technical support. It is important that Check Point can generate greater growth at the support level. Errors are not always easily solved.

2- Updated Documentation. Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support.

3- The costs. Some Check Point features are somewhat expensive.

For how long have I used the solution?

A very good idea to use a web gateway since it generates greater security in the access of our collaborators to the use of the internet and applications,

The use has been successful for at least two years. Initially, the implementation was carried out partially to see the adaptation of the service, which was widely adopted by users understanding the threats that currently exist.

Which solution did I use previously and why did I switch?

Previously, we had validated options and used open-source tools. However, they were most difficult to manage and use.

What's my experience with pricing, setup cost, and licensing?

I always recommend that, before implementing, a customer discusses the business needs with the vendor in order to choose the ideal product.

Also, implement small tests to test the operation before going to production.

Which other solutions did I evaluate?

We needed to be able to quickly implement a tool that would meet the security needs. We already used Check Point products. It has gone very well for us, which is why we opted for the use of this application without hesitation.

What other advice do I have?

I recommend the use of this tool. However, take your time and validate if it suits your needs completely.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ikechukwu Okonkwo - PeerSpot reviewer
Head, Network Security at a financial services firm with 1,001-5,000 employees
Real User
Top 20
It provides top-notch security but is not very user-friendly
Pros and Cons
  • "It has an excellent threat prevention mechanism."
  • "It is not user-friendly."

What is our primary use case?

It helps in establishing a site-to-site VPN with our on-premise firewall. We also use it to protect our cloud environment and layering protection for our cloud data centre.

How has it helped my organization?

This product has improved our organization by serving as a connection point with our partners. In addition, it provides top-notch security and gives us the confidence that we have a secure connection when dealing with our partners.

What is most valuable?

The encryption detection feature and the revision systems are valuable. Additionally, it has an excellent threat prevention mechanism.

What needs improvement?

The product could be improved in terms of its complexity. The product requires prior knowledge and information and would be difficult for an engineer with minimal experience to understand.

For how long have I used the solution?

We have used this solution on premises for approximately seven years and on the cloud for a year.

What do I think about the stability of the solution?

Due to its complexity, I rate its stability a six out of ten. We regularly have to update our hardware with the latest hotfixes to avoid bugs in the system. Additionally, the system has to be updated often to ensure there are no bugs.

What do I think about the scalability of the solution?

The solution is highly scalable. We intend to continually increase our usage of this solution due to its interoperability.

How are customer service and support?

We have not had the best experience with customer service and support, mainly because of the support tier structure. In our experience, our issues are not frequently solved until they are escalated to senior-level engineers, which leads to wasted time as we are often unable to access the experienced engineers until a case has escalated.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup varies depending on whether it is on-premises or on cloud. For cloud, I rate the initial setup a six out of ten. For on-premises, I rate it an eight out of ten. Sometimes, the setup is complex and lasts as long as nine hours.

What about the implementation team?

We implemented it through a third party. Three people who were network security engineers and firewall engineers participated in the deployment.

What's my experience with pricing, setup cost, and licensing?

I don't know the specific licensing prices, but it is based on the deployment size and is relatively more expensive than other products. Once licensing and support costs are paid, there are no additional costs.

Which other solutions did I evaluate?

We evaluated Azure Firewall.

What other advice do I have?

I rate this solution a seven out of ten. The solution is highly interoperable and is of good quality, but it could be improved in terms of its complexity, as it is not user-friendly. Additionally, the support levels could be improved.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user