Find out what your peers are saying about Darktrace, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS).
Efficiency has improved, as we've seen a reduction in attack investigations and also seen efficiency in systems administration, security-wise.
Their knowledge portal and Cato Academy portal are excellent resources.
Our customer service experience is excellent
Our technical teams have personal relationships with our account executives and direct support people.
The customer support for Check Point IPS is great.
Customer support for Check Point IPS is satisfactory.
As an MSSP, we find it scalable for end users across EPP platforms, network, and cloud sides.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
Check Point IPS's scalability is good, as it can handle growth easily if our organization expands.
I would rate the stability of the solution as ten on a scale of one to ten.
Check Point IPS provides a very stable and reliable environment.
The platform lacks strong security features on the edge.
Automated attack path correlation in SmartEvent to improve situational awareness.
I believe they can improve on the algorithms to better identify and predict attacks, and they can also add its binaries to reduce false positives.
Visual analytics and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification.
The pricing is flexible due to our special partnership with Cato Networks.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS has been satisfactory.
It is scalable for end users across network and cloud sides and saves operational costs.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
It made audits easier by helping us pass an audit check, and it also helped to reduce attacks; we've seen actually, ever since we got it, we've not yet gotten any attack, but we've been able to identify possible attacks to our organization.
Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.
Cato Suite runs on a private global network of more than 65 PoPs (points of presence) connected via SLA-backed network providers. The service can connect branches, data centers, users, and clouds. Cato can be deployed in stages to augment legacy network services.
Cato Suite delivers end-to-end route optimization for WAN and cloud traffic. The architecture is self-healing, enabling a high service uptime.
Cato Features
Cato Cloud has a global backbone to deliver a reliable, global network. Here are some key SD-WAN features of Cato Cloud.
What challenges does Cato Network solve?
MPLS (multi-protocol label switching) networks are usually expensive and limited in their capacity. Cato simplifies migrating to a faster, higher-capacity internet and SASE cloud. Cato SD-WAN appliances enable customers to improve usable capacity and resiliency.
Customers who suffer from the challenge of high latency and network inconsistency can use Cato to deliver a consistent connection and user experience to access on-premises and cloud applications.
Cato’s complete network security stack connects all branch locations to the Cato cloud, therefore protecting all traffic, both internet-bound and WAN, with enterprise-grade, cloud-based security services. This capability avoids having to backhaul internet traffic to a data center or hub or having to implement stand-alone cloud security solutions.
Organizations using Cato notice an acceleration of cloud traffic. Cato achieves this by routing all traffic from the edges to the PoP closest to the data center. Because of the close distance between the two, the latency is near zero.
Reviews from Real Users
An IT manager/project coordinator at a healthcare company says that “[Cato is] a cloud-based solution that integrates well with everything. They are the classic SaaS solution.”
Yeong-Gi L., a network engineer at Snetsystems, notes that “The solution is very stable. The scalability is quite good. Technical support was always helpful and responsive. The integration capabilities are not a problem at all.”
"The most valuable feature is that it also works as a next-gen firewall because it has security features," says Lorenzo S., senior solutions consultant Lead at MDI.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
Check Point IPS Features
Check Point IPS has many valuable key features. Some of the most useful ones include:
Check Point IPS Benefits
There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.
A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”
“The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.
Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.