2019-10-06T16:38:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 9

What is your primary use case for Check Point Security Management?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

30
PeerSpot user
30 Answers
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 5Leaderboard
2022-10-14T04:10:00Z
Oct 14, 2022

We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

Search for a product comparison
DH
Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
2022-09-25T03:37:00Z
Sep 25, 2022

The use of this tool is for the administration of policies, control, monitoring, and all the management of our gateway security tool. The separation of these environments has given us a robust solution in which we can apply and protect all the configurations created in our gateways without being afraid if we lose or damage the Check Point Security Management solution. Nothing bad would happen since we can create the environment again at the Microsoft Azure level and later restore the backup without being affected. It also provides us with the required reports on perimeter security.

Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
2022-08-30T12:51:00Z
Aug 30, 2022

One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records. With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration

Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at Akbank
Real User
Top 5
2022-07-30T08:12:00Z
Jul 30, 2022

We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether. We are using management API to apply large configs, clear rules, block malicious IP addresses with SAM rules, and migrate the VLANs with it. We deployed a management HA to provide rulebase synchronization to our DRC firewall segments. We also distributed logs to different Smart-1 appliances to gain performance.

LD
Cloud Support - Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
2022-07-28T03:12:00Z
Jul 28, 2022

Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities. Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.

SM
Network Engineer at Fujairah Port
User
Top 5
2022-06-20T13:01:00Z
Jun 20, 2022

We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls. The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated. Check Point's solution cuts down on the time it takes to manage multiple firewall devices.

Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
654,218 professionals have used our research since 2012.
LN
Technical Manager at M.Tech
Real User
Top 5
2022-05-31T05:08:00Z
May 31, 2022

With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand

DD
Network Engineer at CMA CGM
Real User
2022-05-10T08:05:00Z
May 10, 2022

We are managing Check Point firewalls worldwide, and establishing VPNs between the main data centers in geographic regions and the other agencies worldwide. We also establish VPNs between agencies and customers depending on the need. Several different VPN communities are used. We also establish VPNs with customers and partners with different firewall brands (Cisco, Fortinet, Juniper, etc.). We manage security policies for more than 300 hundred Check Point firewalls by using security policy templates and models.

Christine Kunda Chungu - PeerSpot reviewer
Systems Engineer at Starblabs Limited
Real User
Top 10
2022-05-09T17:25:00Z
May 9, 2022

The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.

Mustafa ÇİÇEK - PeerSpot reviewer
Contracted IT Staff at Sağlık Bakanlığı-Turkish Ministry of Health
Real User
Top 5
2022-05-06T18:48:00Z
May 6, 2022

Security Management Server is easy to configure. We have more than six security gateways in different locations. It is easy to manage security gateways separately from Security Management Server. Also, we use a security management server as a log collector. Security Management Server is easy to configure.

RO
Sr. Security Infrastructure Engineer at NTT Security
Real User
2022-05-06T12:41:00Z
May 6, 2022

As a consultant for a security infrastructure consulting firm, I install and integrate this solution at client premises. There are many types of client domains, such as financials, government, healthcare, etc. It's a stable and complete product that is easy to use and capable of managing their next-gen firewall infra around the globe without compromises. Once the Check Point infra is up and running, clients really appreciate its capabilities of centrally managing security rules, making traffic flows visible, and quick detection and response capabilities in case of issues.

SH
Senior cyber security specialist at Optiv
MSP
2022-05-06T12:15:00Z
May 6, 2022

We use the solution for ensuring the on-premise and cloud-based infrastructure through the Check Point gateway solution. We're applying the solution to the endpoint and running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance. As compared to the other vendors like CISCO ASA, Juniper, and other vendors it's nice to see maximum futures in the single firewall. The site and remote VPN deployment are very easy and troubleshooting the issues is also very easy.

alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
2022-05-04T01:24:00Z
May 4, 2022

The use of this tool was to be able to unify our control of Check Point gateways. With this and in a non-centralized way, we were able to manage everything we required through the blades installed in our management and, in this way, easily unite various environments both Microsoft Azure and on-premise. We developed this environment in an Azure VM since Check Point provides the correct appliance. In addition to that, we also joined local gateway environments and everything worked correctly as expected.

CM
Head of IT Director at Cosyn Limited
Real User
2022-04-30T18:21:32Z
Apr 30, 2022

I mainly use this solution for endpoint security, to capture data with a secure approach.

JC
Systems Administrator with 201-500 employees
Real User
Top 20
2022-02-16T18:45:00Z
Feb 16, 2022

This solution is used to control OPC's. You are also able to generate reports with it.

RD
System Engineer Network & Security at OTTO GmbH & Co KG
User
Top 20
2021-11-22T09:37:00Z
Nov 22, 2021

We primarily use the solution for the management of thousands of rules. partially automated via the well-documented API. Managing the rules is a day-to-day business that takes a lot of time. It is really good that we can do the management through the dashboard. It is so comfortable, and, in contrast to other manufacturers, is structured much better. The integration of the logs allows a quick jump by mouse click between rules and log entry. The API reduces the administrative effort so that we can concentrate on the essential things. in addition, it is an enormous advantage for our customers that rules are created automatically and are available immediately.

AB
Network Security Engineer at Atlantic Data Security
User
2021-11-19T18:38:00Z
Nov 19, 2021

We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.

MB
Presales engineer cybersecurity expert en ElevenPaths at Telefónica
Real User
2021-09-13T15:33:00Z
Sep 13, 2021

Throughout my professional career I have operated, implemented, and designed solutions with Checkpoint's NGFW for clients of all kinds - public and private, small and large. For all scenarios, there is a suitable solution with this manufacturer. Its decades of experience make it one of the undisputed leaders in the industry. In recent times, the platform has evolved significantly to meet the latest threats. I would recommend at least valuing it as an option whenever an opportunity arises to cover cybersecurity needs.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2021-08-25T06:35:00Z
Aug 25, 2021

We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard. It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly. Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces. It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.

DN
Customer Executive IT at Datamatics Global Services Limited
Real User
Top 20
2021-08-25T04:48:00Z
Aug 25, 2021

We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow.

GC
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees
User
Top 10
2021-07-16T04:05:00Z
Jul 16, 2021

I work for one of the biggest Australian banks that rely on Check Point firewalls for security enforcement across several points in the infrastructure environment. The Security Management platform is a key component for our operation, in that it enables efficient central management for configuration and security troubleshooting. This centralised component facilitates and adds value to our daily operations, creating a single place for configurations and a platform that can present security logs that are used for the troubleshooting of security issues.

SM
ICT at a manufacturing company with 501-1,000 employees
Real User
Top 5
2021-06-16T13:31:00Z
Jun 16, 2021

We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.

CA
User at a financial services firm with 5,001-10,000 employees
Real User
Top 10
2021-05-18T15:54:00Z
May 18, 2021

We use it for both perimeter and internal defense.

Swapnil Talegaonkar - PeerSpot reviewer
Technology consultant at a tech services company with 501-1,000 employees
Real User
Top 5Leaderboard
2021-03-23T07:32:00Z
Mar 23, 2021

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system. Two separate packages are created for both perimeter & internal sets. We are also managing a SandBlast device via Security Management. Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
2020-09-27T04:10:00Z
Sep 27, 2020

Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-09-01T08:46:00Z
Sep 1, 2020

We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.

Oleg P. - PeerSpot reviewer
Senior Network and Security Engineer at a computer software company with 201-500 employees
Real User
2020-07-23T17:00:00Z
Jul 23, 2020

Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.

SA
Network Administrator at N S PHARMACY SDN.BHD.
Real User
2020-01-26T09:27:00Z
Jan 26, 2020

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

GeraldChege - PeerSpot reviewer
ICT Officer at Kenyatta National Hospital
Real User
Top 10
2020-01-26T09:26:00Z
Jan 26, 2020

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

TB
System and Network Engineer at a non-tech company with 1,001-5,000 employees
Real User
2019-10-06T16:38:00Z
Oct 6, 2019

We are primarily using the solution as a firewall, and for some IPS features as well.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Sep 25, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 17 answers
Oleg P. - PeerSpot reviewer
Senior Network and Security Engineer at a computer software company with 201-500 employees
Jul 23, 2020
The Check Point solutions in general are not cheap, so your company should have a dedicated budget for security.
JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Sep 27, 2020
The pricing is in line with its competition, like Fortinet. Sometimes applying licensing in products gets a bit messy. We will apply for a license on the manager, specifically for the firewall, but you still see the firewall complaining it doesn't have any rights. In this case, we need vendor support to fix this kind of situation. We need to devise whether we need to have remote sessions with regard to why the firewall is complaining. There must be some kind of protection for the people not to flip licenses that they shouldn't. Sometimes when you buy a new firewall, the licensing is not straightforward to apply. After we fix it, we never have issues again.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Apr 5, 2021
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 4 answers
Oleg P. - PeerSpot reviewer
Senior Network and Security Engineer at a computer software company with 201-500 employees
Jul 23, 2020
The Check Point solutions in general are not cheap, so your company should have a dedicated budget for security.
JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Sep 27, 2020
The pricing is in line with its competition, like Fortinet. Sometimes applying licensing in products gets a bit messy. We will apply for a license on the manager, specifically for the firewall, but you still see the firewall complaining it doesn't have any rights. In this case, we need vendor support to fix this kind of situation. We need to devise whether we need to have remote sessions with regard to why the firewall is complaining. There must be some kind of protection for the people not to flip licenses that they shouldn't. Sometimes when you buy a new firewall, the licensing is not straightforward to apply. After we fix it, we never have issues again.
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
May 2, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Log Management Tools to help you d...
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
May 2, 2022
Top 8 Log Management Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Download Free Report
Download our free Check Point Security Management Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
654,218 professionals have used our research since 2012.