Coming October 25: PeerSpot Awards will be announced! Learn more
2018-07-21T08:18:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 1
  • 26

What do you like most about Check Point NGFW?

Hi Everyone,

What do you like most about Check Point NGFW?

Thanks for sharing your thoughts with the community!

75
PeerSpot user
75 Answers
Rajan Arora - PeerSpot reviewer
AVP - IT Security at a tech services company with 51-200 employees
Real User
Top 10
2021-05-10T14:21:00Z
10 May 21

The central management console has helped with segregation, where planned interventions with management consoles do not have any impact on production or critical business traffic.

Charanjit Bhatia - PeerSpot reviewer
AGM Cyber Security CoE at Bata Group
Real User
Top 5
2021-05-08T13:39:00Z
08 May 21

It creates granular security policies based on users or groups to identify, block or limit the usage of web applications.

Real User
Top 5
2021-05-07T14:36:00Z
07 May 21

Remote access with a secure workspace provides a clear separation between the client and corporate network.

Ümit Güler - PeerSpot reviewer
Consultant at KoçSistem
Real User
Top 5
2021-05-06T16:40:00Z
06 May 21

One of the most valuable features is performance improvement, wherewith ClusterXL and CoreXL, you can improve performance.

JC
CTO at a computer software company with 11-50 employees
Real User
Top 5
2021-05-05T19:37:00Z
05 May 21

The way in which a computer is immediately isolated if it starts behaving badly and I get a notification of an infected computer is also extremely nice and a great feature.

Gulrez - PeerSpot reviewer
Manager at Kotak Mahindra Bank
Real User
Top 5
2021-03-29T13:23:00Z
29 March 21

The threat emulation blade and user identity awareness feature has helped us a lot in terms of perimeter security and have given us granular visibility of user access.

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
632,611 professionals have used our research since 2012.
Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
2021-03-29T10:19:00Z
29 March 21

It provides access to the Internet for corporate resources in a secure manner.

LA
Network, Systems and Security Engineer at SOLTEL Group
Real User
Top 5
2021-03-22T10:00:00Z
22 March 21

I think that the most valuable feature is the prevention of known and zero-day threats because they are constantly trying to access your company and compromise its data.

MP
Network Security Engineer at a tech services company with 10,001+ employees
Real User
Top 10
2021-03-04T01:49:00Z
04 March 21

There are many useful features including the Office VPN, which provides us with a seamless connection for users who are working remotely.

RG
Network Security Engineer at a tech services company with 10,001+ employees
Real User
Top 10
2021-03-02T19:08:00Z
02 March 21

One of the benefits that we have realized from using this product is that the user interface makes it easier to operate, compared to using the CLI.

reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron
Real User
Top 5
2021-03-02T15:18:00Z
02 March 21

The packet inspection capabilities are great.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2021-02-26T11:13:00Z
26 February 21

Check Point provides dedicated blades to monitor network traffic, which helps while troubleshooting network and packet-related issues.

DD
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Top 10
2021-02-18T22:07:00Z
18 February 21

It is easy to control from the central management system. For example, if we have 10 firewalls, and we want to push that same configuration among them, we can use this solution's central management system to do that simultaneously. So, there is time saving in that way. The time savings does depend on the situation. For example, if I am running half an hour of work on each firewall, that will take around 300 minutes. However, if I do this work from the central management system, then it will only take 30 minutes to push the same configuration to those same 10 devices.

KK
Network Associate at a wireless company with 1,001-5,000 employees
Real User
Top 10
2021-02-17T11:56:00Z
17 February 21

We have between five and ten firewalls on-premises, and if we want to configure or push the same configuration to all of the firewalls, then the centralized management system is very helpful.

reviewer1489602 - PeerSpot reviewer
Network Security Assurance Specialist at Visa Inc.
Real User
Top 5
2021-01-18T10:55:00Z
18 January 21

I think the VSX has been the most valuable feature for us.

MA
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Top 10
2020-12-14T06:56:00Z
14 December 20

There are also additional features, compared to a Layer 4 or Layer 3 firewall, such as AV signatures and devices, which are very helpful for securing the company's network.

AP
IT Infrastructure & Cyber Security Manager at a retailer with 501-1,000 employees
Real User
Top 10
2020-11-15T06:39:00Z
15 November 20

The features that are important include: IPS, sandbox, SandBlast, Anti-Bot, and URL filtering.

RM
Senior Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Top 10
2020-11-09T08:11:00Z
09 November 20

The Threat Management feature makes it very easy to detect the vulnerabilities and other factors. We can make new policy according to it. Policy creation is very simple in Check Point. Because the logs are very good in Check Point Firewall, this reduces our work with the reports that we are getting from the Threat Management. It is very convenient for us to use the reports to make new policies for security and other things.

AJ
Sr. Network Engineer at a tech services company with 51-200 employees
Real User
Top 10
2020-10-13T07:21:00Z
13 October 20

It has various features, like Threat Prevention and Antivirus. It is easier to use and have knowledge of a single device rather than multiple devices/technologies when doing an installation. It is also easy to use because of having Antivirus and Threat Prevention features within the same firewall.

BF
Senior IT Manager at a mining and metals company with 501-1,000 employees
Real User
Top 10
2020-10-04T06:40:00Z
04 October 20

The packet inspections have been a strong point. Our identity collectors have also been helpful. In many ways, Check Point has been a step up from our SonicWalls that we had in-house before that. There's a lot of additional flexibility that we didn't have before.

YK
Network Security Engineer at R Systems
Real User
Top 10
2020-09-27T04:10:00Z
27 September 20

The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.

AR
Firewall Administrator at a tech services company with 1,001-5,000 employees
Real User
Top 10
2020-09-27T04:10:00Z
27 September 20

The most valuable feature is the central management system through the Security Management Server. Apart from that, the graphical user interface helps us to do things easily.

AU
Network and Security Specialist at a tech services company with 51-200 employees
Real User
2020-09-23T06:10:00Z
23 September 20

I love the interface of R.80.30. The R.80 interface is very nicely thought out with everything in one place, which makes Check Point easier to use.

Rohit Gambhir - PeerSpot reviewer
Sr. Network Engineer at a consultancy with 51-200 employees
Real User
2020-09-22T07:16:00Z
22 September 20

They have very good support. In critical scenarios, they provide us very quick solutions, are very well-trained, and have a good knowledge about the product. That is what we expect from them.

reviewer1420545 - PeerSpot reviewer
IT-Infrastruktur at Synthesa Chemie Ges.m.b.H
Real User
2020-09-15T09:02:00Z
15 September 20

The most valuable feature is the centralized management, which gives us control over all of the Check Point gateways.

RG
Solutions Lead at a tech services company with 1,001-5,000 employees
Reseller
2020-09-14T06:48:00Z
14 September 20

My favorite feature is the UTM piece and that was the main reason we bought it. It helps us to fine tune the network.

PS
Principal Network and Security Consultant at Vodafone
Real User
2020-09-14T06:48:00Z
14 September 20

Check Point definitely has a great architecture, where you can just enable the software blades and deploy a secure service. Overall, it provides ease of deployment and ease of use.

CL
System Architekt at a financial services firm with 1-10 employees
Real User
2020-09-13T07:02:00Z
13 September 20

The firewall feature and DDoS Protector, when turned on, keep away attacks from the outside. They also prevent users from accessing things on the Internet that they are not supposed to access.

Vighnesh Rege - PeerSpot reviewer
Lead Solution Advisor at Deloitte US
Real User
2020-09-10T07:35:00Z
10 September 20

The application authentication feature of Check Point is the most valuable as it helps us keep users secure.

PJ
Security Administrator at R Systems
Real User
2020-09-10T07:35:00Z
10 September 20

The biggest thing is the central management. It is quite good and allows us to manage the different firewalls from it. We can implement and configure many firewalls and push our policies to them as well.

IT cloud network engineer - PeerSpot reviewer
Junior Network Specialist - Cloud Operations Engineer at a computer software company with 5,001-10,000 employees
Real User
2020-09-09T06:29:00Z
09 September 20

One of the most valuable features is the data center object integration with Azure. We are using Azure a lot and there is very nice synchronization between the objects in Azure, and it's very easy to implement rules using this feature.

PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
2020-09-09T06:29:00Z
09 September 20

The most valuable features are the security blades and the ease of managing the policies, searching log for events, and correlating them.

Sathish Babu - PeerSpot reviewer
Solutions Consultant at Hewlett Packard Enterprise
Real User
2020-09-08T05:15:00Z
08 September 20

The most valuable feature of the firewall is the packet inspection. That is an amazing feature from Check Point.

Ifeanyi Onyiaodike - PeerSpot reviewer
Network security engineer at Fidelity Bank
Real User
Top 5
2020-09-07T05:57:00Z
07 September 20

The most valuable feature for us is the VSX, the virtualization.

Oswaldo Gimeno - PeerSpot reviewer
Network Engineer at Getronics
Real User
2020-09-07T05:57:00Z
07 September 20

It provides a central station where it is very easy to deploy our firewall policy in one click to many firewalls. This is one of the leading perks. It saves time by having one central station because I can deploy the same kind of policy to many firewalls at once.

Steve Vandegaer - PeerSpot reviewer
Senior Engineer Security at NTT Security
Real User
2020-09-06T08:04:00Z
06 September 20

The feature I like the most is their central management, the Smart controller which you can use to manage all the firewalls from one location... Being able to access almost everything in one location — manage all your gateways and get all your logs — for me, is the best feature to work with.

AnkurSingh - PeerSpot reviewer
Technical Support Engineer at AlgoSec
Real User
2020-09-06T08:04:00Z
06 September 20

The Anti-Spoofing has the ability to monitor the interfaces. Suppose any spoofed IP addresses are coming from an external interface, it won't allow them. It will drop that traffic. You have two options with the Anti-Spoofing: prevent or detect. If any kind of spoof traffic is coming through the external interface, we can prevent that.

Sunil Redekar - PeerSpot reviewer
Security Engineer at Hitachi Systems
Real User
2020-09-03T07:49:00Z
03 September 20

In R80.10 and above, you can view logs in SmartConsole. You don't have to open another smart tracker to view logs. That is the improvement Check Point has done which makes it better because it is much easier to find logs. This saves time, approximately 40 to 50 a day in one shift.

SamirShah - PeerSpot reviewer
Network Security Consultant at a energy/utilities company with 5,001-10,000 employees
Consultant
2020-09-03T07:49:00Z
03 September 20

It also gives us a single console for everything. Rather than having one device for URL filtering and a different device as a firewall, this gives us everything in one place.

Matt Millen - PeerSpot reviewer
Network & Systems Administrator I at DMH
Real User
2020-09-02T06:45:00Z
02 September 20

The simplicity of the access control is the most valuable feature for us. It gives us the ability to easily identify traffic that is either being allowed or denied to our network.

AK
Sr. Network Engineer at a insurance company with 5,001-10,000 employees
Real User
Top 10
2020-09-01T05:25:00Z
01 September 20

The central management makes it easier, and is a time-saver, when implementing changes.

SJ
Network Security Administrator at AlgoSec
Real User
Top 10
2020-08-30T08:33:00Z
30 August 20

Check Point has a lot of features. The ones I love are the antivirus, intrusion prevention, and data loss prevention. Apart from that, there is central management through which we can integrate all the firewalls and support them. It makes it easy to manage all the firewalls.

KK
IT Specialist at a tech services company with 10,001+ employees
Real User
2020-08-30T08:33:00Z
30 August 20

We like the centralized management for configuring multiple firewalls. It also gives us the Antivirus, threat prevention, and vulnerability tests. These four features protect the environment with security checks. Vulnerability tests allow us to configure changes that can protect the environment.

Nikhil Dhawan - PeerSpot reviewer
Associate Consultant at a tech services company with 10,001+ employees
MSP
2020-08-27T07:02:00Z
27 August 20

It gives us centralized management for multiple firewalls. For example, if I want to push the same configuration in 10 firewalls, I can push it all at once with the help of the centralized management system.

IK
Security Expert at a aerospace/defense firm with 10,001+ employees
Real User
Top 5
2020-08-19T07:57:00Z
19 August 20

The management platform and the dashboard, the graphical user interface, is one of the best, if not the best, in the business. It's the most intuitive and it's really user-friendly in day-to-day operations.

GG
Security Engineer at a tech services company with 1,001-5,000 employees
Real User
2020-08-12T07:01:00Z
12 August 20

The Check Point API let me make 100 net rules in just 10 minutes, which saved us time.

DmitryPavlukhin - PeerSpot reviewer
Security Analyst at HOST
Real User
2020-08-02T13:27:00Z
02 August 20

AV, IPS, AntiSpam, Sandbox. That's gentlemen set for any basic security, and it was implemented very well. In our reports, the most exciting results belong to AV and IPS. It can be explained by using ThreatCloud - a global knowledge base, which accumulates signatures for all existing and new coming malware, and all the Check Point solutions are always up to date with potential threats.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-07-30T10:05:00Z
30 July 20

It secures my organization. With the application blade, I can make security as application based and the custom application is also very useful. With identity awareness blades we get insights on our local users who are accessing/passing through the respective rule as users. We also use the DLP, IPS, and VPN features.

reviewer1396851 - PeerSpot reviewer
Deputy Manager (Systems) at State Bank of India
Real User
2020-07-29T19:59:00Z
29 July 20

Advanced logging capabilities: Check Point generates extensive logs which may be very useful to figure out the issues. Its logs also contain too much information which can be used to modify the policy as per user need and organizational security environment. The same can be used to figure out probable attack surface or necessary steps for mitigation.

MG
IT Security Manager at a retailer with 10,001+ employees
Real User
Top 5
2020-07-28T14:42:00Z
28 July 20

Check Point is able to satisfy almost any security tool for enterprise clients. This allows us to deploy complex changes from a single management interface, get better visibility, and significantly reduce operational complexity.

VP
Senior Manager, Information Technology at a financial services firm with 10,001+ employees
Real User
2020-07-28T09:29:00Z
28 July 20

Now we can add application signature in the same rule base & don't have to create a different policy for that.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2020-07-27T11:07:00Z
27 July 20

Apart from it having very good features, I personally like the vulnerability assistance via report management which detects host and network vulnerability.

Swapnil Talegaonkar - PeerSpot reviewer
Technology consultant at a tech services company with 501-1,000 employees
Real User
Top 5Leaderboard
2020-07-23T14:53:00Z
23 July 20

Check Point Next-Gen firewall provides security to Internal IT infrastructure with its high-performance hardware & throughput we can use redundancy.

Oleg P. - PeerSpot reviewer
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T10:53:00Z
23 July 20

The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing this solution we have to rely on the Cisco ACLs and Zone-Based firewall that we had configured on switches and routers, which in fact a simple stateful firewall, and currently not an efficient for protecting from advanced threats.

AA
Sr. Security Engineer at EY
Real User
2020-07-22T08:17:00Z
22 July 20

Everything can be managed from a single dashboard nowadays.

TH
Network Engineer at a legal firm with 1,001-5,000 employees
Real User
2020-07-22T08:17:00Z
22 July 20

The interface and the IPS intrusion prevention are the most valuable features of this solution.

Amit Kuhar - PeerSpot reviewer
Network Security Consultant at Atos Syntel
Reseller
2020-07-14T08:15:00Z
14 July 20

It is easy to deploy or upgrade. There is no need to do this manually with commands. This solution can be set up online.

BG
IT Operation Manager at a transportation company with 1,001-5,000 employees
Real User
2020-06-28T08:51:00Z
28 June 20

The scalability is very good.

RF
Manager for Operations, Security and Management at REN - Rede Energeticas Nacionais, S.A.
Real User
2020-06-28T08:51:00Z
28 June 20

The most valuable features for us are identity awareness, IDS and IPS, and application control.

AJ
Sales Engineer at Unistar
Real User
2020-06-25T10:49:23Z
25 June 20

The most valuable features are application control, regulation, and threat prevention.

ChandanSingh - PeerSpot reviewer
Senior Technical Consultant at Ivalue Infosolution
Consultant
2020-06-17T10:55:58Z
17 June 20

The most valuable feature is the Stateful Inspection, which was developed by Check Point.

Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
2020-08-03T09:57:15Z
03 August 20

Centralised dashboard for all checkpoints gateway with options of copying policy from 1 gateway to another 


Providing control at single point for enabling different module for NGFW e.g. IPS/SSL/Web Filtering 

mervemetin - PeerSpot reviewer
Network Security Engineer at Türkiye İş Bankası
Real User
2020-02-17T15:12:00Z
17 February 20

Check Point is very administrator-friendly and the SmartDashboard is easy to use.

ogzbatilay - PeerSpot reviewer
Network Administrator at Türkiye İş Bankası
Real User
2020-02-11T17:53:00Z
11 February 20

SmartCenter and SmartLog are the best platforms to manage firewall rules. SandBlast Zero-Day is very useful when encountering any security leaks.

reviewer1284540 - PeerSpot reviewer
ICT-System-Specialist at a insurance company with 5,001-10,000 employees
Real User
2020-02-10T14:40:00Z
10 February 20

With the new SmartTask offered in R80.40, we will be happy to configure some automatic control-functions.

Gerry Moore - PeerSpot reviewer
Head Of Technical Operations at Boylesports
Real User
2020-02-07T20:14:00Z
07 February 20

The best feature is the ability to increase the capacity of the solution by exactly what you add, not losing anything for High Availability.

reviewer1281831 - PeerSpot reviewer
Security and Network Engineer at a tech services company with 501-1,000 employees
Real User
2020-02-06T11:13:00Z
06 February 20

The rules are very easy to deploy and can be optimized pretty quickly.

reviewer1266306 - PeerSpot reviewer
Deputy Manager - Cyber Security at a transportation company with 5,001-10,000 employees
Real User
2020-01-14T11:08:00Z
14 January 20

The most valuable feature is that we are protected against zero-day threats.

JG
Network Manager at a retailer with 10,001+ employees
Real User
2019-07-07T06:35:00Z
07 July 19

The solution is easy to use. I like the monitoring the most.

RA
Security Engineer at Tenece Professional Services
Reseller
2019-07-02T11:50:00Z
02 July 19

We use Check Point to complete the network compliance rules.

SA
Network Administrator at Nigerian Security Printing & Minting Plc
Real User
2019-06-24T12:13:00Z
24 June 19

The initial setup was very straightforward. You can customize it and change it as you need.

LuisDavila - PeerSpot reviewer
Network and IT Security Admin at DP World Callao
Real User
2019-01-24T13:13:00Z
24 January 19

We never had an outage of the appliances or the consoles. Stability is very strong. I never had a problem related to stability.

JV
Engineer at CENACE
Real User
2019-01-17T10:53:00Z
17 January 19

It is easy to configure and it is a valuable antivirus protection. I especially like the IPS feature of this product.

AA
Senior Network and Security Analyst at a pharma/biotech company with 11-50 employees
Real User
2018-08-01T07:08:00Z
01 August 18

It filters unwanted traffic.

Sandun Fernando - PeerSpot reviewer
Network Administrator at University of Kelaniya
Real User
2018-07-21T08:18:00Z
21 July 18

The most valuable feature is the IPsec VPN.

Related Questions
Yunus Yavuz - PeerSpot reviewer
Product Manager at Neteks
Sep 09, 2022
Hi peers,  I am a Product Manager at a small computer networking company. At the moment, I am researching Check Point's products. Is Check Point's software compatible with other products (including firewall products, servers, and more)? If so, which products? Are there products that are not compatible with Check Point's software? In addition, can you provide any specific documentation that ...
Nurit Sherman - PeerSpot reviewer
Content Operations Manager at PeerSpot (formerly IT Central Station)
Feb 27, 2018
On a scale from 1-10, how would you rate Palo Alto Networks VM-Series and why?
2 out of 15 answers
Adao Costa - PeerSpot reviewer
Managing Partner with 11-50 employees
26 February 18
I rate with 10 Palo Alto Networks VM Series
it_user647970 - PeerSpot reviewer
Senior Network Engineer with 1,001-5,000 employees
26 February 18
We currently do not use Palo Alto VM's and cannot comment on our real world experience. We do use PA-3020, PA-5050 and PA-5060 and they work great. We are planning on deploying Virtual Palo Alto in Azure once funding is provided. ~Andy Soliwoda
Download Free Report
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
632,611 professionals have used our research since 2012.