Try our new research platform with insights from 80,000+ expert users
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Helpful support, good scanning capabilities and has a nice, modern dashboard
Pros and Cons
  • "It has blocked many malware attacks aiming to corrupt and damage company data."
  • "The automatic updates use my internet during downloads before I authorize them."

What is our primary use case?

This antivirus has powerful security features that online threats cannot compromise. It protects all the company's computational devices from ransomware attacks. 

It gives me confidence when browsing the internet with advanced data analytics. 

It has blocked many malware attacks aiming to corrupt and damage company data. 

The solution detects unsafe files and downloads from the internet that are not safe. When doing my research, it gives a warning in advance before I run unsafe links and visit insecure sites.

How has it helped my organization?

I have used this antivirus on both desktop and mobile devices, and it has really helped me from engaging with unsafe content. 

It ensures that we publish excellent articles that meet international policies. 

It is simple to use this software, and we can set it up on any device. It has prevented the company systems from facing interruptions from external viruses that can harm confidential information.

The dashboard is modern and very robust when it comes to data visualization. 

It cleans files that are contaminated before sharing them with my colleagues.

What is most valuable?

Threat detection and response have been a great contribution to our daily programs. 

It provides daily reports on the status of the device and notifications when there are looming data threats. 

It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way. 

Scanning files and data before sharing has reduced the chances of spreading viruses among the members. 

This tool has been stable and has highly improved the security status of the applications.

What needs improvement?

The automatic updates use my internet during downloads before I authorize them. 

This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance. 

Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime. 

The customer support staff has been working 24/7/365 to ensure the system functions excellently.

Buyer's Guide
Check Point Antivirus
May 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for eight months.

What do I think about the stability of the solution?

The performance of this tool is good, and I recommend it to other business enterprises.

What do I think about the scalability of the solution?

Check Point Antivirus has provided comprehensive digital security.

How are customer service and support?

I have been working closely with customer service and their work is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used REVE Antivirus. However, It was very heavy, and it sometimes affected browsing.

How was the initial setup?

The setup was not complex at all.

What about the implementation team?

The implementation was done by the vendor team.

What was our ROI?

The recorded ROI has increased from 20% in the past six months to 50%.

What's my experience with pricing, setup cost, and licensing?

The setup process is simple, and it is easy to learn how it works.

Which other solutions did I evaluate?

I evaluated Powertech's Antivirus. The cost and functionalities were not efficient, however.

What other advice do I have?

This is a great antivirus that has given us a secure space for safe browsing and protection from online theft.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Filters websites well, has good phishing protection, and is reasonably priced
Pros and Cons
  • "Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint."
  • "Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats."

What is our primary use case?

I wanted to protect my system from threats as sensitive business information was being stored in it, understanding that keeping the hardware in a secure location won't be enough measure to protect all the data in it. I went over different options in the market as Kaspersky Lab, ESET, Symantec, and Check Point of course, and spoke to a representative and did my own investigations. I came to the realization that this was the best solution for the need and the budget I had available and it hasn't disappointed me since.

How has it helped my organization?

Given the fact that threats are evolving every day, it is really important to have a solution that's ahead of transforming viruses that can leak in multiple forms and channels. Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint. It also provides email protection and detects threats in the public networks you're trying to connect your device to.

What is most valuable?

Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful. 

Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.

What needs improvement?

We've noticed that the management console has some limitations as it's managed through the browser. Despite being user-friendly it could definitely include a wider range of security measurements that can make it more customizable depending on the end-user interests. If the end-user happens to want a Linux OS it can't access the smart console as it's .exe and only supported through Windows. This means they'll have to use a virtual PC to access the .exe which just makes it a bit of a hassle for these end-users.

For how long have I used the solution?

I've been using the solution for over seven years.

Which solution did I use previously and why did I switch?

We did use Kaspersky and switched as there were security concerns around the privacy of the data.

What's my experience with pricing, setup cost, and licensing?

Check Point's price point was right in the middle. It's not the cheapest and not the most expensive and offers a good cost/benefit ratio.

Which other solutions did I evaluate?

We looked at Kaspersky, ESET, Symantec, BitDefender, and McAfee.

What other advice do I have?

Overall I am very satisfied.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
May 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Presales Engineer at Vincacyber
Real User
Top 5Leaderboard
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
  • "The solution offers multiple features in one solution, along with data detection."
  • "Check Point should provide some technical sessions on antivirus solutions."

What is our primary use case?

We use the solution for antivirus, device encryption, file encryption, and URL filtering.

What is most valuable?

The solution offers multiple features in one solution, along with data detection.

What needs improvement?

The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.

For how long have I used the solution?

I have been using Check Point Antivirus for 6-8 months.

What do I think about the stability of the solution?

Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.

I rate the solution’s stability a seven out of ten.

What do I think about the scalability of the solution?

The solution is scalable. We have a few customers using this solution.

How are customer service and support?

It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.

How was the initial setup?

The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.

What was our ROI?

The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.

What's my experience with pricing, setup cost, and licensing?

The product’s pricing is moderate.

What other advice do I have?

Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.

1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.

I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.

We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.

Overall, I rate the solution an 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group
Real User
Top 5Leaderboard
An easy-to-use and stable solution
Pros and Cons
  • "The solution does a pretty good job and is easy to use. I am the person maintaining the tool and only one person is required to maintain it. Their configuration portal is user-friendly and anyone can crack it with a little bit of knowledge."
  • "I would like to see them implement a system that would enable us to do certain things from our mobile like applying policies, opening up and blocking ports, and restricting connection. It is because IT personnel are not always around on the premises. We can instantly do these things from our mobile. They should also consider the price so that many people will go for the solution."

What needs improvement?

The solution has a mobile monitoring system called WatchTower that you can link to a mobile. It would be great if they could add an antivirus feature so that we can monitor individual TCS activities too. Anyone willing to use this solution can certainly do so. The tool is very easy to use and the approach to security and updates is very good. Implementing policies and rules on-premises is also very user-friendly with the solution. Moreover, we can direct three to four billings together. If one ISP goes down, the second one automatically picks up. People wouldn’t even know that their internet has dropped. This kind of technology with low latency is very advantageous.

I would like to see them implement a system that would enable us to do certain things from our mobile like applying policies, opening up and blocking ports, and restricting connection. It is because IT personnel are not always around on the premises. We can instantly do these things from our mobile. 

They should also consider reducing the price so that more people will go for the solution.

For how long have I used the solution?

I have been using the tool for almost two years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. There are roughly 60 users for the solution in our company.

How are customer service and support?

I have not contacted the tech support team directly. I contacted them through the Check Point dealers in Sri Lanka. They have technicians who assist us. I contacted them several times to understand some settings during the installation of the tool in the system.

Which solution did I use previously and why did I switch?

I have used Kaspersky and found Check Point to be better. There was an incident with Kaspersky when a person clicked on an email-generated ransomware and it got onto the system. Kaspersky couldn’t protect against the attacks and the ransomware spread. However, when the system was monitored by Check Point, the firewall protected it from downloading any malicious files. Hence, Check Point is doing a better job than Kaspersky. The only advantage that Kaspersky has over Check Point is the price since it is cheaper than Check Point. 

Kaspersky costs below 50,000-40,000 Sri Lankan Rupees.

How was the initial setup?

The deployment of the solution is straightforward.

What's my experience with pricing, setup cost, and licensing?

We are paying 2,50,000 Sri Lankan Rupees annually which is the fixed charge.

What other advice do I have?

I would rate the solution a nine out of ten. The solution does a pretty good job and is easy to use. I am the person maintaining the tool and only one person is required to maintain it. Their configuration portal is user-friendly and anyone can crack it with a little bit of knowledge.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
SHRINKHALA SINGH - PeerSpot reviewer
Senior Manager at Advertising Standards Council of India
Real User
Top 10
Addresses zero-day threats and next-gen viral threat attacks while offering very good integration
Pros and Cons
  • "It is one of the best security solutions in the market today."
  • "The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent."

What is our primary use case?

Check Point Antivirus helps restrict malicious threats and trojans from entering into the IT system and secure the system end to end. 

Also, its feature of endpoint detection and response helps business users to restrict any malware attack onto the system in more robust manner and stop any threat attack attempts.

It also secures the system in a foolproof way and boosts the performance to greatest extent. This result boosted productivity and improved outcomes for the organization as a whole. It is one of the best antivirus applications on the market currently. 

How has it helped my organization?

Check Point Antivirus has removed the endpoint threats in a more secure and structured manner. 

Also, its advanced malware detection technique helped strengthen the IT system's security and permanently remove any threat entrant from the system.

Through ThreatCloud, it helps in the identification and correct detection of potential malware entry into the cloud server and also provides immediate auto-remediation upon detection of any threat attack on the server.

It is one of the best security solutions in the market today. We highly recommend it to everyone.

What is most valuable?

The ThreatCloud is an amazing feature and helps in intelligent and proactive detection of threat attacks along with auto-remediation of the system.

The industry cloud and integration services with alert notifications are some really exciting features that helped in achieving flexible and strengthened security administration.

It addresses zero-day threats and next-gen viral threat attacks on the system and also has strengthened the security administration through a single management console.

What needs improvement?

The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent.

Competition is huge and is strongly advised to keep innovating the features and utilities so that it stands out in comparison to its competition in the market.

They need to have an extension of the trial period/trial version so that more startups and small, marginal, and medium enterprises can also be part of this without any hesitation.

For how long have I used the solution?

I've used the solution for six to 12 months.

What do I think about the stability of the solution?

The product offers amazing stability features.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

We've had the best experience with technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are a first-time user.

How was the initial setup?

It is easy to use and deploy across any platform.

What about the implementation team?

The vendor assisted with the setup.

What was our ROI?

We've seen an ROI of over 80%.

What's my experience with pricing, setup cost, and licensing?

I'd advise potential users to go for the Check Point advanced security solutions as they are credible and trusted by many.

Which other solutions did I evaluate?

A lot of security solutions were checked by the tech team.

What other advice do I have?

Users should go for it; you will not regret it.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good scanning capabilities, excellent network security, and easy to configure
Pros and Cons
  • "It can scan the files that our users have downloaded to check if they have a virus."
  • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

What is our primary use case?

Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

How has it helped my organization?

It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

What is most valuable?

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

What needs improvement?

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

For how long have I used the solution?

Check Point Antivirus was implemented 4 years ago.

What do I think about the stability of the solution?

It is a very stable product. However, we've had some problems with the updates.

What do I think about the scalability of the solution?

It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

How are customer service and support?

The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Check Point as our first option.

How was the initial setup?

The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

What about the implementation team?

The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

What was our ROI?

Our ROI is that we keep all our network and equipment safe and updated.

What's my experience with pricing, setup cost, and licensing?

I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

Which other solutions did I evaluate?

As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

What other advice do I have?

Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Real User
Top 5Leaderboard
Comes with AI features and secures enterprise networks
Pros and Cons
  • "The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks."
  • "Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency."

What is our primary use case?

We use Check Point Antivirus to secure our enterprise network. It protects our data servers from malware attacks. 

What is most valuable?

The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks. 

What needs improvement?

Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency. 

For how long have I used the solution?

I have been using the product for two years. 

What do I think about the stability of the solution?

The product is stable. I rate it a nine out of ten. 

What do I think about the scalability of the solution?

Check Point Antivirus is scalable. You can add the 'n' number of servers at any time. My company has 1000 users. 

How are customer service and support?

The tool's tech support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

The tool's deployment is easy and takes two to three hours to complete. A single person can do deployment. The tool has a SmartConsole feature, which helps to deploy it efficiently without much processing. It is easy to maintain, and one person can handle the maintenance. 

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the most economical solution. 

What other advice do I have?

The product is an AI-based solution with the latest capabilities. It offers the most secure protection. I rate it an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 20
Moderately priced, easy to configure, and good support
Pros and Cons
  • "Check Point Antivirus is easy to configure."
  • "Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation."

What is our primary use case?

Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.

How has it helped my organization?

Check Point Antivirus has improved our organization by being able to identify known threats and actively drop connections to ensure our users remain secure. It leverages the Bogus DNS endpoint from Check Point to redirect traffic destined for known threats and doesn't require a lot of admin overhead to configure or tune based on the organization's needs. An added bonus is Check Points "Threat Cloud" which all of its gateways talk to so that attacks that are detected in one customer's environment are updated and would be blocked automatically within another environment. 

What is most valuable?

Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.

What needs improvement?

Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation. I have had a few times where something was detected as being a false positive and TAC requested so much information that in all honesty, was not worth my time to collect as the URL being blocked was a simple webpage that, based on my analysis, the IP was previously being used for malicious intent and was now a legitimate business however was still being blocked by the blade.

For how long have I used the solution?

I've used the solution for five years. 

What do I think about the stability of the solution?

We have not had any performance issues.

What do I think about the scalability of the solution?

It is easy to scale and enable on SGs as long as they are managed by the same SMS.

How are customer service and support?

Support has improved over the years.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No previous solution was utilized. This solution has been in place on the SGs since they were installed.

How was the initial setup?

The setup is straightforward. It is enabled from the SMS and it works.

What about the implementation team?

We managed the setup of the solution in-house.

What was our ROI?

The ROI is revealed by the fact that it protects end-users.

What's my experience with pricing, setup cost, and licensing?

Check Point in general is moderately priced compared to competitors.

Which other solutions did I evaluate?

We evaluated Palo Alto and Fortigate.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.