Try our new research platform with insights from 80,000+ expert users
Assistant Manager IT Projects at Mustafa Sultan Office Technology Co. LLC
Real User
Reliable solution with a unique architecture that creates flexibility in the deployment
Pros and Cons
  • "A unique architecture makes this product stand out from other solutions."
  • "It can be difficult to install properly without prior training"

What is our primary use case?

We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is.

The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.

How has it helped my organization?

Check Point gives us a strong solution that we can depend on when deploying it for clients.

What is most valuable?

The most valuable features are within the unique architecture that creates flexibility in the deployment.

What needs improvement?

The knowledge base that is available is limited and it is on a closed network where only a customer or certified engineer will know about it. A beginner who wants to learn about the product actually has to enroll in training or get certified and have a valid license or certification to access information. That is something I find strange as most users would like to know about it. The new users would like to be able to see those areas and what type of concerns or any configuration issues they may have before deciding to work with the product. To me, that is a simple open-mindedness. In terms of the availability of the system and functionality of the product, there's no concern. But the problem is that efficient VSX (Virtual System Extension) deployment is complicated. Most of our customers are afraid to deploy any configuration changes because they are afraid something will happen.

It's not the same situation as with other products. I guess the reason behind it is the kind of architecture which they are using. There are more possibilities to crash than other products. That is the feedback I normally get from end-users, but even so, for us, I would say it's one of the best product.

Buyer's Guide
Check Point CloudGuard Network Security
September 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

We've been using this product for over two years.

What do I think about the stability of the solution?

Check Point is very stable. I would say that initially there were a couple of issues we had during deployments. But now we have climbed the learning curve of the product and all installations are very stable. We have most clients running on version 7.3 and didn't upgrade most further from there because we know that 7.3 is stable and it is what we are running most of the customers now.

What do I think about the scalability of the solution?

Scalability is fine. In fact, we are demonstrating the hyper scale with most of the customer now. There is no doubt about the scalability and it is not a problem.

How are customer service and support?

Up until now, we have not had to register with technical support from Check Point. If we needed help we got support with the presale technical support team from our region. He was able to help us internally. The team helps us to get products stable. Up until now, we did not contact them. It is not very transparent. They approach resolutions through a partner and the partner solves the case. They seem to mostly depend on partners for the resolution of issues.

Which solution did I use previously and why did I switch?

We deploy a variety of products for our clients depending on their needs. Check Point is one of the most reliable.

How was the initial setup?

I would say that the installation is straightforward when you have learned about the architecture. Before that, the installations may be a little confusing.

What about the implementation team?

We are partners with Check Point so we handle the installations and deployment. In the beginning, we did have some engineers from Check Point assist us in the initial installations, but after that it was fine and we were able to manage it by ourselves.

What's my experience with pricing, setup cost, and licensing?

Check Point pricing is high. It is a sector where there is heavy competition so it does not help when trying to sell the product. But one thing is that the sales chain is fantastic. The price is usually the most difficult thing when we discuss Check Point with customers, their feedback is that it is not a competitively inexpensive product. Clients want to know why that is and if we could scale the price. Check Point can have more presence in the market, but if they want it to compete, they have to come down in price a little more. I would say 20 to 30% lower. The product is fine.

What other advice do I have?

The web application firewall is commonly used in most firewalls now. If they can add that as a feature, it would be a very strong scenario. When we use Check Point on a perimeter or a DMZ zone, the first thing that clients ask is if there is wireless protection. Check Point has IPS (Intrusion Prevention System) but it does not have wireless protection. So if production is using the cloud if they can integrate mobile app protection, mobile shielding, there's more value for Check Point, but if they include that, Check Point could be the very best firewall option.

On a scale from one to ten, when one is the worst and ten is the best, I would rate Check Point as an eight. It needs to do better in pricing and with broader features for mobile.

One thing that I learned from multiple installations of Check Point is that you have to train the customer before implementing. Unless the customer is already a highly skilled security engineer so that they know what they can get out of the product, they will not be as satisfied. Otherwise, just before the deployment, we have them go for training so they understand the product and what it can do.

They will be happier and they won't choose to go with another product in the future. Even with my engineers who understand many other products, I trained them properly before I send them out for deployments. Check Point is not a product that if you don't know you can just install without knowing anything about it. You have to know the architecture first. You have to know each and every option than work on the product. Then it will be far better and say no to certain features which are not important to use. On the other hand, knowing it is available is fantastic and becomes an option in the right situations.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
it_user919560 - PeerSpot reviewer
Consultant at a government with 10,001+ employees
Consultant
A good firewall solution that's extremely stable and can scale easily
Pros and Cons
  • "The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features."
  • "Sometimes, if you aren't familiar with the solution, it can be a bit complex, but it does become easier to use with time. However, every time they launch a new version, it becomes more complex and you need to take time to get familiar with all the changes. For every version that they upgrade, you need to upskill yourself."

What is our primary use case?

We primarily use the solution as firewall security for our clients.

What is most valuable?

The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features.

What needs improvement?

Reporting needs improvement. It's difficult to utilize properly. Currently, I'm in a situation whereby a client of ours is looking for reporting on their organizational unit. Check Point has failed to do that. We've been trying to do it for the past month and we haven't been able to. We've also gotten techs from Check Point to call us to help and we just can't get the solution to do what we need it to do.

Sometimes, if you aren't familiar with the solution, it can be a bit complex, but it does become easier to use with time. However, every time they launch a new version, it becomes more complex and you need to take time to get familiar with all the changes. For every version that they upgrade, you need to upskill yourself. 

For how long have I used the solution?

I've been using the solution for three years.

What do I think about the stability of the solution?

The stability of the solution is fantastic.

What do I think about the scalability of the solution?

The scalability potential of the solution is great. We use the solution quite extensively. We do plan to increase usage in the future.

How are customer service and technical support?

If I were rating technical support out of ten, I would give it a seven. They're inconsistent. Sometimes you do get guys from Check Point to help you out and then sometimes you don't. Sometimes it's hard getting a hold of them.

Which solution did I use previously and why did I switch?

We didn't previously use a different solution.

How was the initial setup?

The initial setup is straightforward. The time it takes to deploy depends on the organization.

What about the implementation team?

We handled the implementation ourselves.

Which other solutions did I evaluate?

I am familiar with Fortinet, although I didn't do a direct comparison. I did compare other solutions as well.

What other advice do I have?

For those who want to implement the solution, they should make sure they have a very strong networking background.

I would rate the solution eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point CloudGuard Network Security
September 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
it_user819654 - PeerSpot reviewer
Network Consultant Engineer at a tech services company with 11-50 employees
Real User
Excellent technical support but the zero-day threat detection needs improvement
Pros and Cons
  • "The program is very stable."
  • "It is a very expensive program and there are additional costs despite the standard licensing fees."

What is our primary use case?

Our primary use case of this solution is for security.

What is most valuable?

The IPs and the VPN are the most valuable features of this solution.

What needs improvement?

I would like to see an improvement on the zero-day threat detection. It is also not very user-friendly, so it would be great if it could be less complicated and easier to operate. The dashboard needs to be easier to use.

Also, if the solution could be cheaper, it would really help, because it is very expensive. 

I would like to see sand boxing added to the new version.

For how long have I used the solution?

I have been using Check Point Virtual Systems for ten years now.

What do I think about the stability of the solution?

The program is very stable.

How are customer service and technical support?

The technical support is excellent and they always responded when we had an issue.

How was the initial setup?

The initial setup wasn't too complicated, but it wasn't very easy and straightforward. Deployment took us about a week. 

What's my experience with pricing, setup cost, and licensing?

It is a very expensive program and there are additional costs despite the standard licensing fees. So I would like to see it being more affordable in the future.

What other advice do I have?

I will recommend this program to others and my rating is seven out of ten. I do recommend that users should always use the checkpoints and backup as often as they can.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user715161 - PeerSpot reviewer
Director at InfoGuardian
Real User
An expandable solution that can be upgraded on-demand and as required
Pros and Cons
  • "The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
  • "The management console can be simplified because at the moment, it is a bit of a challenge to use."

What is our primary use case?

We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers.

This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.

What is most valuable?

The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM. You don't have to buy a UTM to start off with, but rather, you can buy a simple firewall and upgrade it. The simple firewall comes with many of the UTM features, in any case.

What needs improvement?

The management console can be simplified because at the moment, it is a bit of a challenge to use.

I would like to see support for software-defined wirings in the next release of this solution.

For how long have I used the solution?

I have been working with this solution for eighteen years.

What do I think about the stability of the solution?

I've got Check Point systems that have not been rebooted in two years, so it is quite stable.

What do I think about the scalability of the solution?

This solution is quite scalable, but it requires hardware upgrades from time to time. Or, if you go with a virtual environment then it is very scalable because you start with one CPU and can increase to twenty-four CPUs.

How are customer service and technical support?

Technical support for this solution is fairly good. We have got enough skill in our business to do most of it, but once you raise a call with support, they give you quite the fast and effective answer.

How was the initial setup?

The initial setup of this solution is in-between, but more on the complex side. It's not the most complex product that I've worked with, but definitely not the simplest product that I've worked with.

What's my experience with pricing, setup cost, and licensing?

The price of this solution varies from small to extremely expensive. On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.

What other advice do I have?

The biggest lesson that I have learned from this solution is to never assume that something is simple, because there's always a hidden snag that we run into.

I would rate this solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
it_user1146165 - PeerSpot reviewer
it_user1146165Cibersecurity Pre-Sales at a tech services company with 10,001+ employees
Real User

Auto-Scale Palo Alto Networks VM-Series Firewalls in a Public Cloud Environment
For environments that require an automatic deployment as scale out of the security services is required, you can
combine bootstrapping with additional automation that monitors the security services and, when performance limits
are reached, triggers (CloudWatch) the automatic deployment and bootstrap of a new firewall to the security layer.
Auto-scaling works differently in every environment because tools that are specific to each public cloud environment
monitor and trigger the firewall deployment. Auto-scaling in AWS uses AWS services such as Lambda, Amazon Cloud-
Watch, S3, and SNS, in addition to the APIs and bootstrapping on the firewalls. In Azure, you use AppInsights and
Virtual Machine Scale Sets to monitor the environment and trigger the automatic deployment of a new firewall. You
can use a number of metrics in order to trigger the auto-scale event. Examples include:
• Data Plane CPU Utilization %
• GP Gateway Utilization %
• Active Sessions
• Data Plane Packet Buffer Utilization %
• SSL Proxy Session Utilization %
• Session Utilization %
Just like in the previous example, you must create the bootstrap container before automatic scale-out. The automation
monitors the appropriate metric on the existing firewalls, and after the value is higher than allowed for the right amount
of time, the scale-out event triggers the same firewall deployment as in the previous example. After the firewall is deployed and has a configuration provided by Panorama, the auto-scale automation adds the new firewall to the backend pool of the load balancer, ensuring that traffic load is appropriately distributed to the new firewall.

Operational Response to a Changing Environment
In virtual private data center and public cloud environments where new compute instances are created as needed for
scale, the administrative overhead in managing security policy can be cumbersome. Using dynamic address groups in
security policy allows for agility and prevents disruption in services or gaps in protection.
The VM-Monitoring Agent on the firewall can pull IP address and tag information from the cloud environment. Predefined dynamic address groups use the tag information to automatically associate IP addresses to pre-defined rules in the security policy. When there are multiple firewalls in the environment, they all can monitor the same source for IP and tag information. This provides the firewalls a dynamic but consistent view of the resources within the environment.
Dynamic address groups allow the firewall security policy to respond to a changing environment, but the applications
running in the environment must be well known for the appropriate dynamic address groups and security policy rules
to be created. Configuration automation can be used to provide a security policy that automatically is configured when
new applications are deployed to the environment.

Security Response Based on Log Information
Although log information alone can be extremely valuable to a security administrator, manually sifting through the logs
and responding to security events takes too long and requires too many administrative resources. Automated security
actions in the firewall can respond when a previously identified scenario presents itself in the logs. For example, when
Panorama sees a correlation event, it can use the source IP address from the log and use auto-tagging to attach a predefined tag, such as “Compromised.”
You can configure a dynamic address group on the firewall that is associated to the IP addresses with the “Compromised” tag. You can then create a security policy that blocks the traffic or enforces multi-factor authentication (MFA) for these endpoints that uses the dynamic address group as the source. If the user on the endpoint is malicious, MFA blocks their attempt to move laterally within the network, protecting sensitive data.
If the user continues to attempt to move laterally, Panorama can automatically use additional tags to block the IP and
HTTP log forwarding to log an incident. Panorama can use the ServiceNow ticketing system HTTP API to create a ticket so that the operations team is aware of this action on the endpoint. They can then investigate the incident, remediate the endpoint if needed, and remove the associated tags the apply the enhanced security policy.

Security Response to Improper Cloud Environment Configuration
RedLock cloud security provides organizations configuration security alerting for AWS, Azure, and GCP environments
and provides integrations that allow remediation to be automated. Using auto-remediation, organizations can make
sure alerts are automatically remediated before they, or malicious actors, even know there’s an issue. For example,
reconfiguring a security group rule that allows ingress traffic from the public Internet and opening a ticket with Service-
Now for tracking minutes after it’s been created.
RedLock uses the following automation process to remediate issues:
1. Using the cloud environment’s API, continuously perform checks against the configured signatures and policies.
2. If the resulting analysis determines a signature did not pass, send the failed alert to an integration such as
ServiceNow or AWS Simple Notification Service (SNS).
3. The AWS SNS service triggers the workflow automation and launches the AWS Lambda auto-remediation
function.
4. Using the AWS API, auto-remediate and fix the offending issue.
5. Send the resulting logs to AWS CloudWatch.

NtwrkSec67 - PeerSpot reviewer
Network and Security Manager at a financial services firm with 1,001-5,000 employees
Real User
Our network performance has increased since implementing this solution
Pros and Cons
  • "It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution."
  • "The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours."

What is our primary use case?

This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution.

What is most valuable?

We currently upgraded our devices to a new version. We have noticed a performance increase. We tested filtering features and it's an interesting feature that helps us with our tasks. We don't need very complex features.

For how long have I used the solution?

We have been using Check Point for about two years.

What do I think about the stability of the solution?

It's a high-performance device. The network performance is also really good. We check how much time it takes for the servers. Our network performance has increased since using this solution. 

How are customer service and technical support?

We have a local consultant for this solution. They can handle most of the operations with my team. We work together with the consultant sometimes for complicated scenarios like migration.

How was the initial setup?

The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours. We migrated from an old to a new one. It's not so complex but Check Point is complex in comparison to other firewalls. For example, Palo Alto is easier to install than Check Point. 

What's my experience with pricing, setup cost, and licensing?

We negotiate every deal to get a discount for a higher number of devices. 

What other advice do I have?

I would rate it a nine out of ten and I would recommend this solution. Their support team should be faster because sometimes when we need support their responses are late. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SeniorNe6125 - PeerSpot reviewer
Senior Network Engineer at a marketing services firm with 1,001-5,000 employees
Real User
This solution has provided the security that we were lacking on the cloud
Pros and Cons
  • "It is scalable. It's a cloud solution, so it's easy to implement and manage."
  • "I like how straightforward it is and simple it is to implement in the cloud."
  • "The product can still grow."

What is our primary use case?

Our primary use case of this solution is cloud protection for MC65 Operating System, AWS, and Microsoft.

How has it helped my organization?

Right now, we have a hybrid infrastructure. We needed security on the cloud, and this solution has provided the security that we were lacking.

What is most valuable?

  • Traps prevention
  • Security on the cloud

What needs improvement?

The product can still grow.

What do I think about the stability of the solution?

It is fast. It provides what we need at the moment, and it's still growing.

What do I think about the scalability of the solution?

It is scalable. It's a cloud solution, so it's easy to implement and manage.

How are customer service and technical support?

Technical support is fair. I have had some good support technicians when I call in. 

Which solution did I use previously and why did I switch?

We were not on the cloud before. We're a big Check Point customer. Our secure perimeter is checkpoint, so we needed security for the cloud. So, it was a pretty easy decision right there. We evaluated other vendors, but it was easy decision.

How was the initial setup?

The initial setup was straightforward, not complex.

What about the implementation team?

We did our own deployment. We used a reseller for buying the product, but not for the implementation.

Which other solutions did I evaluate?

We also looked at Cisco's cloud products since we have a lot of Cisco products.

What other advice do I have?

Look into it. I like how straightforward it is and simple it is to implement in the cloud. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
reviewer1010472 - PeerSpot reviewer
Architect, Network - Service Lead - Design Services at a manufacturing company with 10,001+ employees
Real User
Enables us to move into the cloud without having to change a lot of our internal processes and retrain staff but it has more maturing to do
Pros and Cons
  • "Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution."
  • "I would like to see more focus on east-west traffic inspection and AWS."

What is our primary use case?

Our primary use case is for major cloud vendors: AWS and Azure. 

How has it helped my organization?

Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution. 

What is most valuable?

It is what we use mainly for on-premise. That is really what has us using the product, as it is sort of our standard for data centers.

What needs improvement?

I would like to see more focus on east-west traffic inspection and AWS.

Things are changing very quickly in the cloud. There is a lot more maturing that needs to happen as far as CloudGuard goes, specifically more around some cloud native type situations where everything is being shoehorned through one or multiple VMs is not optimal.

What do I think about the stability of the solution?

We definitely have to watch new versions and deploy them in a smart way, but that is the way with any type of software.

What do I think about the scalability of the solution?

The scalability depends on the situation. Some situations are not very scalable. High scalability, in AWS, without matting is just not there. It's more of an AWS problem than it is a Check Point problem.

How are customer service and technical support?

We are receiving our technical support through a partner. Therefore, we do not really engage directly with Check Point that much. We use the partner for technical support matters, who is great.

Which solution did I use previously and why did I switch?

We did not use anything previously. Going to the cloud was a new requirement for us.

How was the initial setup?

The initial setup was just as straightforward as setting up a physical Check Point box would have been.

What about the implementation team?

We implemented in-house by deploying it ourselves.

What was our ROI?

We don't really track the ROI on this.

Which other solutions did I evaluate?

We also considered Fortinet. Check Point has better overall integration with Azure.

I was part of the decision-making process.

What other advice do I have?

I would rate it a six out of ten. 

Other vendors typically are working with hardware acceleration and various other products, which you can't get in the cloud. One of the key things that made us more comfortable with Check Point is this is only thing that they do. It's the same exact thing as they are doing on-premise for the most part.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at Acliv Technologies Pvt Ltd
Real User
Enables us to monitor what comes over to our network and we can then check the dashboard and work accordingly
Pros and Cons
  • "The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly."
  • "The initial setup was a bit complex."

What is our primary use case?

We use this solution to secure networks. We block unwanted malware. 

How has it helped my organization?

We have a development team who asked us to open reports. We asked that they initiate traffic to see what is blocking them. We then give them reports and after that, they ask to open the report for the traffic application and we work accordingly.

What is most valuable?

The most valuable feature is the monitoring. We can easily monitor what kind of stuff comes over to our network and we can then check the dashboard and work accordingly.

What needs improvement?

I would like for them to develop guides. If you compare it with Cisco, you can just type out any problem you're having regarding Cisco and you will easily get a solution. With Check Point, it's not easy to get a solution.

For how long have I used the solution?

Three to five years.

What do I think about the scalability of the solution?

We maxed out scalability. 

How was the initial setup?

The initial setup was a bit complex. Is take two or three months to implement and we have to continuously work on it. We needed two to three engineers for deployment. 

Which other solutions did I evaluate?

We researched the top firewall solutions and settled on Check Point and Palo Alto. Comparatively, both are good. 

What other advice do I have?

Ultimately Palo Alto is a very advanced firewall. This firewall can easily identify what application is running behind the network.

I would rate this solution an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.