We performed a comparison between Change Tracker Gen7 R2 and Check Point IPS based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I have contacted the support once and the experience was good, I was satisfied."
"Whitelisting services are the most valuable feature of Change Tracker Gen7 R2."
"It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"The notifications are the most valuable feature of the solution."
"There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network."
"IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
"Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
"The reports are well written so that you can understand what type of attack has occurred, the originating IP address, and other details."
"The most valuable feature is that it protects us against hundreds of different attack vectors, like ransomware. The protection is always being triggered. People try to access websites that are categorized as malware, so when the users do a DNS request for the IP of those malware websites, the IPS Blade replaces the real IP of the website that is malware with a bogus IP. The user gets an IP that doesn't exist and when he tries to access, it won't work."
"This is a very stable product."
"The solution could include more integrations."
"The solution could improve by being more secure and have better integration."
"When entering, it always takes a long time to load."
"The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable."
"After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market."
"The only thing they could maybe improve is that we notice right away that the performance decreases when we enable the IPS, especially beyond the CPU and memory usage. If you want to enable the IPS and you have a lot of traffic, it can have an impact. The performance could be improved."
"The tool's pricing could be better."
"This is an expensive solution, higher than other products on the market."
"The pain point that I have with this solution is contacting technical support."
"We want the solution to continue to move towards cloud-based and portability focused for telecommuting users."
Change Tracker Gen7 R2 is ranked 21st in Intrusion Detection and Prevention Software (IDPS) with 2 reviews while Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews. Change Tracker Gen7 R2 is rated 9.0, while Check Point IPS is rated 8.6. The top reviewer of Change Tracker Gen7 R2 writes "A stable solution that can be used for secure configuration management and file integrity monitoring". On the other hand, the top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". Change Tracker Gen7 R2 is most compared with Fortra's Tripwire Enterprise, whereas Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Cisco NGIPS. See our Change Tracker Gen7 R2 vs. Check Point IPS report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.