We use the solution for web traffic filtering. We also create policies to block unwanted information from going out or coming into our enterprise. We also want to understand user behavior and the type of sites the users are looking at. It gives us more security because we can block the sites that try to interfere with our network.
Senior Manager ICT & Innovations at a logistics company with 501-1,000 employees
A user-friendly product that enables organizations to understand user behavior and create policies to block threats from internal and external users
Pros and Cons
- "The product is very user-friendly."
- "The documentation must be improved."
What is our primary use case?
What is most valuable?
The product is very user-friendly. The solution does not allow users to use a proxy to access websites. If they try to do it, we get an alert.
What needs improvement?
The documentation must be improved. It will help the engineers to upskill themselves.
For how long have I used the solution?
I have been using the solution for two years.
Buyer's Guide
Check Point Web Gateway
December 2025
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable. I rate the stability a nine out of ten.
What do I think about the scalability of the solution?
The product is scalable. I rate the scalability a nine out of ten. We have almost 400 to 500 users.
How are customer service and support?
The support is very good. The queries are closed at the last minute.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used an open-source solution before, but it did not filter the traffic well. So, we decided to switch the product.
How was the initial setup?
The deployment is very easy. The deployment took one week. We need only one person to deploy and maintain the solution. It's easy to maintain it. The person maintaining the tool must perform data analysis of the blocked sites and the sites monitored by the management. The tool is deployed on the cloud.
What was our ROI?
We have seen a return on investment. Our bandwidth is optimized, and our internet spending has been minimized by 40%.
What's my experience with pricing, setup cost, and licensing?
The price is very high. It must be reduced.
What other advice do I have?
The solution can reduce operational costs and threats from internal and external users. Overall, I rate the tool an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber SOC Manager at a financial services firm with 501-1,000 employees
A cloud solution to filter internet traffic with average pricing
What is our primary use case?
Check Point is a very closed technology that filters internet traffic.
What is most valuable?
The most valuable feature is the granularity of the security policy. We can select one application, and in that application, we can control all the components of that application. It provides in-depth control of any application. For example, Facebook is one application. You can do it if you want to block the Facebook chat and use the Facebook application. Facebook will work, but you won't be able to open the Facebook chat window.
What needs improvement?
Check Point can introduce Honeypot. A honeypot is a dummy server inside the network to identify the numeric attack pattern.
For how long have I used the solution?
I have been using Check Point Web Gateway for three years.
What do I think about the scalability of the solution?
The solution was very much scalable.
How are customer service and support?
The support is good.
Which solution did I use previously and why did I switch?
We have used Forcepoint. We moved from the Forcepoint because it cannot control the traffic at the granular level we were looking for. Facebook should be on, but the chat or file uploading should be blocked. At the same time, Check Point provides in-depth control and advanced functionality compared to Forcepoint.
How was the initial setup?
The initial setup is easy and takes around two months to complete.
What's my experience with pricing, setup cost, and licensing?
The solution has average pricing. It's worth the money.
What other advice do I have?
Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Web Gateway
December 2025
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Senior Technical Consultant- Cyber Security at a tech services company with 51-200 employees
An easy-to-deploy solution that most users desire because it fulfills their security needs
Pros and Cons
- "The product covers all the security needs of roaming users."
- "The support team’s response is not fast."
What is our primary use case?
Roaming users use the secure web gateway. We also use the tool for application filtering and web filtering.
What is most valuable?
The product covers all the security needs of roaming users.
What needs improvement?
The support team’s response is not fast. The product must improve its scalability and stability.
For how long have I used the solution?
I have been working with the solution for three years.
What do I think about the stability of the solution?
I rate the stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the scalability a nine out of ten. We have more than 50 customers.
How are customer service and support?
Technical support is good. The support team’s response time is moderate.
How was the initial setup?
The solution is cloud-based. It is very easy to deploy the tool in the customer’s environment.
What about the implementation team?
The solution can be deployed within half an hour or one hour. We have an in-house team for deployment.
What's my experience with pricing, setup cost, and licensing?
Our customers pay a licensing fee annually or once in three or five years, per their requirements.
What other advice do I have?
I am using the latest version of the product. We sell the product. It is very easy to provide the price list and the features. I take care of the solution design and solution presentation to the customer. There are multiple OEMs for web gateways in the market. A set of customers use only Check Point. The ROI depends on the customer. Overall, I rate the tool a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Soporte técnico superior at a financial services firm with 51-200 employees
Improves efficiency and lowers bandwidth costs but needs more scalability
Pros and Cons
- "One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network."
- "The solution should improve integration."
What is our primary use case?
Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes.
Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.
How has it helped my organization?
It has given us the ability to optimize advanced caching and comprehension techniques to improve web performance and reduce the bandwidth used by online applications. This allows our company to improve the efficiency of its network infrastructure and reduces bandwidth costs, thus achieving outstanding performance in the generation of reports and analysis. Now, we can better understand the use of the web and the threats we face every day. The solution allows for general organization reports, offering us data and information in a personalized way.
What is most valuable?
One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network. This allows us to filter and analyze all network traffic, including web traffic, and to effectively detect and block any web or malware threats that may be trying to infiltrate the network.
In addition to providing us with threat protection, we can also make use of tools to control the bandwidth and limit of users to websites and online applications. This helps us prevent users from accessing malicious websites or any site that is not authorized.
What needs improvement?
The solution should improve integration. Today, its scalability is one of its few characteristics that must be improved. We may need to consider an alternative solution due to its complexity. We need more elasticity to make it more scalable, dynamic, and efficient. It is important to note that many of its analytics features are among the best, yet it still needs improvements and updates that are faster and more efficient under control directives and policies. We would like an easy deployment and a solution that can scale vertically or horizontally.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Software Engineer at a tech vendor with 201-500 employees
Good blocking and URL filtering with helpful support
Pros and Cons
- "Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding."
- "The learning curve is complex for new users."
What is our primary use case?
Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.
How has it helped my organization?
There have been reduced attacks from cyber criminals since we deployed this product. The security models enhance safe collaboration among teams and embrace teamwork. It has enabled the IT teams to set up a unified control system for tracking website performance. Implementation of set projects and tasks has been efficient with available resources. The deployed security services protect all the organization's employees based on the set company policies. Employees can focus on productive goals without fear of ransomware attacks.
What is most valuable?
URL filtering has shielded employees from engaging with unsafe browsing sites that can spread viruses. It provides red alerts when there is an attempt from an unauthorized user who may be accessing confidential information.
The product blocks unsafe content from the internet that can affect internal data.
Application control gives IT teams an opportunity to set suitable policies that can be used by all teams when coding.
Data Loss Prevention helps us to categorize and share data that is not harmful or can leak confidential data to the wrong personnel.
What needs improvement?
The set features have been guarding our websites against external attacks effectively.
The learning curve is complex for new users. That said, with time, everything runs effectively. The cost of deployment and maintenance is high for SMEs. We have achieved most set goals as planned without failure.
Antivirus features block trojans and harmful content from affecting workflows, and that has saved us a lot of money.
Updates come late, sometimes exposing the organization to attacks that can affect operations.
This product has good features that have been of great improvement overall.
For how long have I used the solution?
I've used the solution for 11 months.
What do I think about the stability of the solution?
Operations have been running effectively.
What do I think about the scalability of the solution?
The performance has always been stable.
How are customer service and support?
I am pleased with the customer support services.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have no experience with similar tools.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation took place through the vendor.
What was our ROI?
There is increased ROI from stable performance.
What's my experience with pricing, setup cost, and licensing?
The cost and setup depend on the size of the company.
Which other solutions did I evaluate?
This is the best tool that I have come across so far.
What other advice do I have?
For website security, this is the best solution.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a security firm with 51-200 employees
Flexible with good web filtering and overall robust security
Pros and Cons
- "The stability of the tool is very good."
- "Perhaps the latency in the administrative part of the portal would be a point of improvement."
What is our primary use case?
Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure.
Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network.
Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.
How has it helped my organization?
When this tool was implemented, it gave us a lot of flexibility and confidence in the organization. The characteristics, such as web filtering and security in URL applications are great. With them, we have great visibility of vulnerabilities that surround us. With analysis, it was possible to attack all the points where the company had security weaknesses and strengthen those points. It also presents a large part of very granular reports or statistics.
What is most valuable?
The Check Point Web Gateway tool presents several valuable features such as URL filtering, application, and antivirus control. These characteristics are very valuable since they are customer-oriented.
It provides very efficient security and can also be implemented in the cloud, which is very good. In recent years the cloud has gained a lot of strength and is very valuable in terms of IPS capacity.
What needs improvement?
At the moment, we have not found any point of improvement in the last three years. The tool has behaved very well both in scalability and stability.
Perhaps the latency in the administrative part of the portal would be a point of improvement.
The technical support of Check Point, in general, has had problems in providing effective, reliable, and timely support. On many occasions, we have had problems and it did not help us in a reasonable amount of time.
That said, in general, the tool provides the respective functionality for which it was created and protects the organization very well.
For how long have I used the solution?
We implemented the solution 4 years ago..
What do I think about the stability of the solution?
The stability of the tool is very good. They always stay on top of everything. There have been very few times we have seen problems.
What do I think about the scalability of the solution?
It has very good scalability and is very fast.
How are customer service and support?
The experience with technical support has not been very good. We always have problems with a quick response.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously no tool had been implemented.
How was the initial setup?
The configuration was very simple the tool is easy to install.
What about the implementation team?
The tool was implemented with the IT department and an engineer provided by the vendor with a lot of experience.
What was our ROI?
We've seen an ROI in terms of the security implementation. The price is also important. You have to look for a good tool that 100% meets what you are looking for.
What's my experience with pricing, setup cost, and licensing?
The installation is very easy and user-friendly, and fast. The cost is competitive in the market.
Which other solutions did I evaluate?
Other options were not evaluated since we have handled some Check Point tools previously, and we liked the characteristics of this one.
What other advice do I have?
It is a reliable and safe tool.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 23, 2025
Flag as inappropriateUsed in Cloud, excellent option, modern and safe
Pros and Cons
- "The implementation of this tool was straightforward."
- "Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support."
What is our primary use case?
Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need.
Then we were allowed to try this type of tool and see the results.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.
How has it helped my organization?
The Check Point Web Gateway tool has helped us improve the security of the equipment and access that we previously had. Generally, a lot of malware was installed on the equipment, which without the user realizing it affected both the performance and the exposure of the information that they had access. After the implementation of Check Point, these threats disappeared little by little, improving through granular policies in which through user profiles we were attacking to solve them. It's been an excellent tool for us.
What is most valuable?
The features of Check Point Web Gateway that we liked the most are the following:
1- Monitoring. The monitoring provided by Check Point security technologies is very good, easy to understand, and helps in an excellent way to verify the behavior of the tool.
2- Granular Policies. Through granular policies, we were able to create different profiles that depended on the type of user. In some cases, it is more restrictive for normal users than for managerial users, that is, always mainly providing security. However, different restrictions helped us a lot. We could establish them without generating annoyance for the client depending on their role in the company.
3- Easy implementation.
What needs improvement?
The aspects that we have evaluated over time to give an opinion on an improvement that the Check Point security manufacturer can generate are the following:
1- Improvement of technical support. It is important that Check Point can generate greater growth at the support level. Errors are not always easily solved.
2- Updated Documentation. Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support.
3- The costs. Some Check Point features are somewhat expensive.
For how long have I used the solution?
A very good idea to use a web gateway since it generates greater security in the access of our collaborators to the use of the internet and applications,
The use has been successful for at least two years. Initially, the implementation was carried out partially to see the adaptation of the service, which was widely adopted by users understanding the threats that currently exist.
Which solution did I use previously and why did I switch?
Previously, we had validated options and used open-source tools. However, they were most difficult to manage and use.
What's my experience with pricing, setup cost, and licensing?
I always recommend that, before implementing, a customer discusses the business needs with the vendor in order to choose the ideal product.
Also, implement small tests to test the operation before going to production.
Which other solutions did I evaluate?
We needed to be able to quickly implement a tool that would meet the security needs. We already used Check Point products. It has gone very well for us, which is why we opted for the use of this application without hesitation.
What other advice do I have?
I recommend the use of this tool. However, take your time and validate if it suits your needs completely.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Perimeter Security Administrator at a security firm with 51-200 employees
Prevents prevent data loss has good content filtering and offers good security
Pros and Cons
- "It offers good security and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility."
- "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."
What is our primary use case?
We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access.
How has it helped my organization?
The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers. The evolution of technological attacks or hacks has become very innovative and sophisticated, which can make any organization vulnerable. However, we have come to feel safe implementing this type of solution as it has given us the protection that each one of us was looking for.
What is most valuable?
The Check Point Security Web Gateway service has the most beneficial features available for anyone. Among many of the things that we can highlight is the content filtering application control. Checking for antiviruses is enabled through the inspection solution. It offers good security, and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility.
What needs improvement?
The solution is quite complete and is very prominent. It is designed to be implemented for web services. We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment. If they could do this and provide the same connectivity, security, and efficiency that it has today for edge equipment, that would be ideal. If we could bring this service to mobile applications and applications directly installed on the device, we could expand and create a neural security network for all the devices we have.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Product Categories
Secure Web Gateways (SWG)Popular Comparisons
Cisco Umbrella
Zscaler Internet Access
Cloudflare One
Skyhigh Security
Forcepoint Secure Web Gateway
Netskope Next Gen Secure Web Gateway
Cisco Web Security Appliance
Symantec Proxy
Barracuda Web Security and Filtering
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- When evaluating Web Security Gateways, what aspect do you think is the most important to look for?
- What is the best security web gateway?
- Is Netskope's SWG as good as the Zscaler SWG?
- What secure web gateway do you recommend?
- Why is Secure Web Gateways (SWG) important for companies?
















