Try our new research platform with insights from 80,000+ expert users
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Has good threat cloud integration, sandboxing, and behavioral analysis features
Pros and Cons
    • "Performance and resource consumption should be reduced."

    What is our primary use case?

    Check Point Antivirus has a great design for network, security gateway deployment, threat detection, and prevention.                                              

    How has it helped my organization?

    Check Point Antivirus is a valuable tool for organizations because it helps them secure the network and data.                                                                              

    What is most valuable?

    The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.

    What needs improvement?

    Performance and resource consumption should be reduced. 

    Additional features should be EDR, Advanced sandboxing technology, deeper cloud integration, etc.                                                                                         

    Buyer's Guide
    Check Point Antivirus
    May 2025
    Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
    851,823 professionals have used our research since 2012.

    For how long have I used the solution?

    I have been using it for the past four years.

    What do I think about the stability of the solution?

    The stability is good.

    What do I think about the scalability of the solution?

    Scalability is good.

    How are customer service and support?

    The support is good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup is excellent.

    What about the implementation team?

    We did the implementation in-house.

    What was our ROI?

    We have seen good ROI.

    Which other solutions did I evaluate?

    We also evaluated CrowdStike Falcon and Sophos Intercept X.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1805079 - PeerSpot reviewer
    Network Engineer at Fujairah Port
    User
    Good signature-based protection, great sandbox feature, and offers continuous scanning
    Pros and Cons
    • "Regular email alerts are beneficial."
    • "The technical support could be improved."

    What is our primary use case?

    We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.

    We have two security gateway and one security management server which is running R81 gaia OS.

    We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.

    Check Point Antivirus continuously scans each and every file before reaching the destination.

    How has it helped my organization?

    Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.

    Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.

    Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.

    What is most valuable?

    Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet

    The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.

    It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.

     Overall, this system performs a superb job of safeguarding us.

    What needs improvement?

    The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.

    The technical support could be improved.

    Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.

    For how long have I used the solution?

    I've used the solution for more than two years.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Check Point Antivirus
    May 2025
    Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
    851,823 professionals have used our research since 2012.
    reviewer1536681 - PeerSpot reviewer
    Network, Systems and Security Engineer at SOLTEL Group
    Real User
    Easy to scale, heuristic scanning protects against previously unknown threats, and the support is good
    Pros and Cons
    • "Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses."
    • "It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks."

    What is our primary use case?

    We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions.

    It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software.

    Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.

    How has it helped my organization?

    We decided to implement Check Point Antivirus because they are an avant-garde company and they design the latest technology. In this case, their solution implements:

    • Signature-based detection identifies malware by comparing code in a program to the code of known virus types that have already been encountered, analyzed, and recorded in a database.
    • Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses.
    • Rootkit detection scans and blocks malicious code designed to gain administrative access to a machine.
    • Real-time detection scans and monitors files as they are accessed.

    What is most valuable?

    For us, the most valuable feature of Check Point Antivirus is the real-time detection scan that monitors files as they are accessed. It is important because we can react quickly.

    Today, malicious coders and hackers are experts at evasive tactics that shield their activities. Therefore, in today’s cybersecurity landscape, antivirus is just one of the many tools in an organization’s cybersecurity arsenal to keep the business safe.

    The antivirus solution should be implemented as part of the organization’s endpoint security solution that combines global threat intelligence and advanced threat prevention engines that address zero-day and other next-generation threats.

    What needs improvement?

    It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks.

    Today, next-gen approaches extend signature-based detection with behavioral detection, machine learning, sandboxing, and other techniques that are optimized to address threats such as malicious URLs, browser hijackers, advanced persistent threats, and phishing exploits. However, zero-day attacks keep happening quite frequently.

    For how long have I used the solution?

    We have been using Check Point Antivirus for 11 months.

    What do I think about the stability of the solution?

    In 11 months, we haven't had any problems. Our system is very stable and works fine.

    What do I think about the scalability of the solution?

    This solution is easily scalable.

    We deployed this solution once, and we have only needed to add new devices/servers/endpoints to our infrastructure to expand it.

    How are customer service and technical support?

    Check Point Service Support is very good. Normally, they contact you shortly after you open the ticket, and in all cases, they have given us a good solution.

    Which solution did I use previously and why did I switch?

    We use only this solution as a centralized solution. At other times, we used free software products.

    How was the initial setup?

    Before the initial setup, we used a training pack. For this, we can set up the entire system in a short time and we only use a small number of support hours.

    What about the implementation team?

    We implemented it through the best vendor team in Spain. They are 100% recommendable.

    Which other solutions did I evaluate?

    My team and I evaluated other products and vendors based on price, experience, technology, ease of configuration, integration time, licensing, etc. Finally, we opted for this Check Point solution.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Cloud Support at a tech company with 1-10 employees
    User
    Check Point Antivirus its a great solution, easy installation.
    Pros and Cons
    • "It generates enough visibility in terms of what happens on our equipment."
    • "We would like to see better guides in the future with more concrete examples of the best practices."

    What is our primary use case?

    The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point Security Management.

    It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy.

    It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.

    How has it helped my organization?

    Our organization teams used a Microsoft-based antivirus. However, we already had Check Point gateways in use. We wanted to unify the protection more, and we tried the use of Check Point Antivirus. We really have no complaints. It offers good anti-malware protection and ransomware, among other modern threat protection features. The installation of the equipment was easy, and we achieved the main objective of unifying the protected environment.

    We currently use Check Point Management R81, which is one of the most complete versions.

    What is most valuable?

    The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.

    The sandboxing validates some files that have threat qualities. 

    We like this security tool.

    What needs improvement?

    Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.

    We would like to see better guides in the future with more concrete examples of the best practices.

    The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people. 

    Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.

    For how long have I used the solution?

    For at least eight months, we have used this solution, which greatly facilitates our security. It is an antivirus implemented through Check Point Gateway R81.

    Which solution did I use previously and why did I switch?

    Previously, we used a Microsoft Antivirus. It's not bad. However, we wanted a tool integrated with our Check Point technologies, and therefore, we validated the options to make the required changes.

    What's my experience with pricing, setup cost, and licensing?

    It is important to assess and verify the costs of Check Point technologies with an expert vendor to help determine the technology and tool that can meet the specific business needs of each company.

    The documentation is outdated. However, if it is validated well, it is possible to obtain what is required for the implementations.

    Which other solutions did I evaluate?

    At the level of antivirus, we looked at Sophos and McAfee. However, the implementation most adopted in our environment was Check Point. We are convinced that it was the best option.

    What other advice do I have?

    The product is an easy-to-implement and centralized antivirus solution. I recommend it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Consultant at SOCIEDAD AXIOBASE S.A.
    Consultant
    It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
    Pros and Cons
    • "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
    • "What's missing in Check Point Antivirus is the EDL feature."

    What is our primary use case?

    I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.

    What is most valuable?

    What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.

    What needs improvement?

    What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.

    What do I think about the stability of the solution?

    Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.

    What do I think about the scalability of the solution?

    Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.

    The scalability of the tool is a nine out of ten.

    How are customer service and support?

    Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.

    I'd rate Check Point Antivirus support as eight out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.

    Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.

    What's my experience with pricing, setup cost, and licensing?

    Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.

    What other advice do I have?

    I'm a consultant working with Check Point technologies, including Check Point Antivirus.

    Deploying and maintaining Check Point Antivirus requires two to three engineers.

    My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.

    My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner/Consultant
    PeerSpot user
    reviewer2005812 - PeerSpot reviewer
    Human Resources Manager at Beat
    User
    Good virus detection with helpful performance metrics and a simple deployment
    Pros and Cons
    • "The application runs very fast and does not affect the performance speed of the device where it is installed."
    • "When there are many devices, it is more costly since each device requires unique login credentials."

    What is our primary use case?

    The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action. 

    Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux. 

    Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.

    How has it helped my organization?

    The software has improved the digital experience of employees who have deployed it. 

    I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks. 

    Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements. 

    The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress. 

    The software screens applications to ensure they perform effectively.

    What is most valuable?

    Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance. 

    It provides networking reports on the data security situation, which enables users to make decisions. 

    Performance metrics provided regularly help the IT team plan to curb any threats to company data.

    It is easy to deploy the antivirus and learn how it works. 

    The application runs very fast and does not affect the performance speed of the device where it is installed. 

    Daily security analysis indicators help team members to engage any abnormality with real-time insights.

    What needs improvement?

    The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device. 

    I am happy with the set data models since they monitor the security situation of new sites before browsing. 

    I have not observed most failures since I started using this software. 

    The company can embark on timely updates to ensure the application is compatible with devices. 

    Customer support comes in on time when we contact them via online chats and phone calls. 

    When there are many devices, it is more costly since each device requires unique login credentials. 

    The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.

    For how long have I used the solution?

    I've used the solution for eight months.

    What do I think about the stability of the solution?

    It works for a long time without failing and does not misbehave.

    What do I think about the scalability of the solution?

    The antivirus performance has been excellent.

    How are customer service and support?

    The customer service team has never failed us.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I used Kaspersky Antivirus, however, it used to fail most of the time. 

    How was the initial setup?

    The installation process of the application is easy and straightforward.

    What about the implementation team?

    I deployed it through a vendor, and they are doing well.

    What was our ROI?

    A secure work environment has contributed to increased ROI.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is suitable, and the setup process is simple.

    Which other solutions did I evaluate?

    I evaluated most free online antiviruses, however, they were not effective.

    What other advice do I have?

     Check Point Antivirus is a sure bet for the detection of any virus.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1853787 - PeerSpot reviewer
    Systems Engineer at HarborTech Mobility
    User
    Good file scanning, stops malicious files, and detects/blocks malware
    Pros and Cons
    • "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
    • "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."

    What is our primary use case?

    The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.

    The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.

    I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.

    How has it helped my organization?

    Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.

    Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.

    What is most valuable?

    If you need a good antivirus, Check Point Antivirus is more than great. 

    Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.

    One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.

    What needs improvement?

    Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.

    I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.

    I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.

    For how long have I used the solution?

    We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.

    Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.

    Which solution did I use previously and why did I switch?

    We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.

    What's my experience with pricing, setup cost, and licensing?

    I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.  

    Which other solutions did I evaluate?

    We just work with Check Point Antivirus until now and we found that this solution is the best.

    What other advice do I have?

    If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    RSSI at SDIS49
    Real User
    Top 10
    Provides good security and integrates well with other products
    Pros and Cons
    • "Check Point integrates well with other security products."
    • "The initial setup and configuration should be simplified."

    What is our primary use case?

    We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.

    What is most valuable?

    The most valuable feature is security.

    Check Point integrates well with other security products.

    What needs improvement?

    The pricing can be improved.

    The interface could be more user-friendly.

    The initial setup and configuration should be simplified.

    For how long have I used the solution?

    We have been using Check Point Antivirus for four years.

    What do I think about the stability of the solution?

    This is a very stable product.

    What do I think about the scalability of the solution?

    We have not had the need to scale. We have about 3,000 people who are protected by Check Point, and three of them are administrators.

    How are customer service and technical support?

    I would say that the technical support is okay. There are two levels; there is our installer, who we have known for several years, and there is the engineer, who we do not have much contact with.  

    Which solution did I use previously and why did I switch?

    We use Windows Defender for our endpoint antivirus solution. For email protection, we use the FireEye Email Security solution. Our Check Point handles our central filtering and we also use some Infinity products. All of these work in combination with each other for our security.

    How was the initial setup?

    The initial setup is complex. For the complete installation, our deployment took a few days.

    What about the implementation team?

    We had the help of a Check Point specialist for our deployment.

    What other advice do I have?

    This is a good product and one that I recommend.

    I would rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2025
    Product Categories
    Anti-Malware Tools
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.