No more typing reviews! Try our Samantha, our new voice AI agent.
D Alvarado - PeerSpot reviewer
IT Cloud Learder at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Nov 13, 2025
Has improved threat prevention with proactive protection and seamless integration
Pros and Cons
  • "Since implementing Check Point IPS, we've seen a significant positive impact, as the company no longer spends time worrying about threats like ransomware, allowing us to focus on our core operation with greater peace of mind, and it has also reduced the time our team spends managing incidents, making our security process more efficient overall."
  • "One area that could be improved in Check Point IPS is the user interface for managing IPS policies, which can be a bit complex for new users, along with the need for faster signature updates for emerging threats and more seamless integration with third-party tools."

What is our primary use case?

My main use case for Check Point IPS in my company is to detect and block different kinds of activities around the trash or various vulnerabilities.

For example, I use Check Point IPS to detect or block activities when I encounter different malware or intrusions in my network area, and I need to block these with IPS technology.

In the past, another company in my group had a bad experience when they encountered different malware in their network area, blocking various databases, and this company didn't have any technology to stop this situation, so Check Point IPS helped in that instance.

What is most valuable?

One of the best features Check Point IPS offers is proactive protection, which I consider a great feature for IPS.

The proactive protection feature of Check Point IPS helps me and my organization by blocking ransomware and other malware, especially during an incident where different items get infected, showing its value in preventing such intrusions.

The integration of Check Point IPS with Check Point gateways and control in the Infinity Portal is another interesting feature that I find valuable.

Check Point IPS has positively impacted my organization since we no longer spend time worrying about threats like ransomware.

Since implementing Check Point IPS, we've seen a significant positive impact, as the company no longer spends time worrying about threats like ransomware, allowing us to focus on our core operation with greater peace of mind, and it has also reduced the time our team spends managing incidents, making our security process more efficient overall.

What needs improvement?

One area that could be improved in Check Point IPS is the user interface for managing IPS policies, which can be a bit complex for new users, along with the need for faster signature updates for emerging threats and more seamless integration with third-party tools. A simpler policy setup and faster updates would enhance the experience.

For how long have I used the solution?

I have been using Check Point IPS for about five or six years now.

Buyer's Guide
Check Point IPS
March 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.

What do I think about the stability of the solution?

Check Point IPS is stable.

What do I think about the scalability of the solution?

The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.

How are customer service and support?

In the past, customer support was so-so, but now it has improved.

Which solution did I use previously and why did I switch?

I have not used a different solution before Check Point IPS.

What was our ROI?

I think about the time saved when considering the return on investment with Check Point IPS.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point IPS is great because I had to read various documents to understand different situations, and it has been a great experience overall.

Which other solutions did I evaluate?

Before choosing Check Point IPS, I did not evaluate other options, as I preferred Check Point IPS for a long time.

What other advice do I have?

For others looking into using Check Point IPS, I would say it is a great company with excellent characteristics for handling vulnerabilities.

I would rate Check Point IPS eight out of ten because there are other things I don't prefer, such as the price and other aspects.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 13, 2025
Flag as inappropriate
PeerSpot user
Abhijeet Chaskar - PeerSpot reviewer
Cyber Security Analyst at Digitaltrack
Real User
Top 5Leaderboard
Dec 23, 2025
Security gateway has provided autonomous threat prevention and now protects daily network traffic
Pros and Cons
  • "Check Point IPS's cloud threat intelligence is outstanding."

    What is our primary use case?

    Check Point IPS is our main security feature within the security gateway, securing our network infrastructure and resources from cyber threats and zero-day attacks.

    We have configured a LAN to WAN policy with Check Point IPS as a security profile applied to that particular security policy. Any traffic passing through from our private network to the WAN side, including downloads from users, files, applications, or website access, is checked to determine if it is genuine traffic or if it includes malicious content such as phishing emails or websites, which is then blocked by Check Point IPS.

    What is most valuable?

    Check Point IPS's cloud threat intelligence is outstanding. Check Point IPS is regularly updated from that intelligence regarding the signatures of current threats or CVE updates, so all threat intelligence is updated automatically, relieving us from the burden of manual updates, which is highly beneficial for our organization.

    It has made our job significantly easier because we do not have to worry about updates or any manual tasks on Check Point IPS. After implementing Check Point IPS once and configuring it perfectly, there is no additional need for technical input from our side; it works independently at the configuration level.

    Incidents of cyber attacks are genuinely blocked by Check Point IPS, and we can see this reflected in our logs captured by the solution.

    Some of the malicious traffic requested by endpoint users is perfectly blocked based on threat intelligence, such as while downloading something from the internet. That incident demonstrated its effectiveness.

    What needs improvement?

    Check Point IPS is currently working perfectly for us, but in the future, the addition of AI or more automated reporting features could enhance the solution, and that would be beneficial.

    For how long have I used the solution?

    I have been using Check Point IPS for more than three years.

    What do I think about the stability of the solution?

    Check Point IPS has demonstrated no issues with reliability or instability in our daily activities; it is working well for us.

    What do I think about the scalability of the solution?

    Check Point IPS handles our organization's growth well with no scalability issues.

    How are customer service and support?

    I have had an excellent experience with Check Point IPS's customer team, as their technical knowledge and troubleshooting skills are excellent.

    How would you rate customer service and support?

    Positive

    What other advice do I have?

    I advise any organization to leverage Check Point IPS as a feature of the security gateway, which they can quickly configure and apply to a security policy, using it as a base solution for securing their network infrastructure. I would rate this solution a 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Dec 23, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point IPS
    March 2026
    Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
    885,444 professionals have used our research since 2012.
    Dhanaji Mali - PeerSpot reviewer
    Technical Specialist at VDA Infosolutions Pvt. Ltd.
    Real User
    Top 5
    Oct 24, 2025
    Has reduced threat events and protects our network with accurate signature updates
    Pros and Cons
    • "Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively as it has reduced threat events and requires less time to configure and manage."
    • "The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved."

    What is our primary use case?

    We are using Check Point IPS for the security of our private resources and the overall organization network.

    With the help of Check Point IPS, our organization network is protected in real time through the threat intelligence database that automatically gets updated from the threat cloud AI of Check Point IPS.

    What is most valuable?

    The best feature is that Check Point IPS not only prevents threats but also gets automatic signature updates from the Check Point threat cloud. It also has fewer false positives.

    Whenever new vulnerabilities or CVEs come in the cybersecurity network, they are fed from the Check Point threat cloud. From their cloud threat center, the signature gets automatically updated into the Check Point Security Gateway where Check Point IPS is present. The signatures are accurate, which helps reduce false positives compared to many other IPS solutions.

    Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively. It has reduced threat events and requires less time to configure and manage.

    What needs improvement?

    The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved.

    For how long have I used the solution?

    We have been using Check Point IPS for almost two years.

    What do I think about the stability of the solution?

    The solution is stable.

    What do I think about the scalability of the solution?

    Scalability is good.

    How are customer service and support?

    The support team is supportive, but sometimes in complex troubleshooting, they take time to resolve issues.

    Which solution did I use previously and why did I switch?

    We were using Sophos IPS before moving to Check Point IPS.

    How was the initial setup?

    The solution has reduced threat events and takes less time to configure and manage.

    What about the implementation team?

    We implemented this as a customer.

    What was our ROI?

    Time has been saved because the manageability is very easy.

    Which other solutions did I evaluate?

    We evaluated Fortinet IPS.

    What other advice do I have?

    I would advise anyone looking for an IPS solution to consider Check Point IPS as a solution. On a scale of one to ten, I rate this solution an eight.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Oct 24, 2025
    Flag as inappropriate
    PeerSpot user
    Technical Specialist at Softcell Technologies Limited
    Real User
    Top 5Leaderboard
    May 7, 2025
    Granular policy control maximizes flexibility while deep packet inspection identifies potential threats
    Pros and Cons
    • "I would rate this solution a 9 out of 10."
    • "Improvement suggestions include more attractive dashboards, enhanced visual analytics, and automated attack path correlation in SmartEvent to improve situational awareness."

    What is our primary use case?

    The main use case for Check Point IPS is to protect against malicious attacks and traffic entering the network. Check Point IPS provides protection from cyber threats and malware that should not be executed in the client network, ensuring the network remains secure. It matches threats to signatures in its database and takes action to block known and unknown threats. Additionally, Check Point IPS enables deep packet inspection, allowing for easy decryption of traffic and identification of potential threats.

    What is most valuable?

    The granular policy control in Check Point IPS allows administrators to define customized IPS policies based on severity or protocols, providing flexibility and minimizing false positives. The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures. Behavioral heuristic analysis helps block zero-day attacks using AI-powered engines. Integration with SmartEvent provides centralized monitoring, logging, and reporting for IPS events, allowing security teams to analyze attack patterns. Check Point IPS also offers high-power processing hardware to handle the load of traffic inspection, ensuring that features like antivirus, firewall security, and IPS can be utilized efficiently without overburdening hardware resources.

    What needs improvement?

    Improvement suggestions include more attractive dashboards, enhanced visual analytics, and automated attack path correlation in SmartEvent to improve situational awareness.

    For how long have I used the solution?

    I have been using Check Point IPS for more than two years for operational purposes and troubleshooting cases.

    What other advice do I have?

    Check Point IPS allows for customization of IPS signatures with thousands of entries in the database. By default, it operates according to Check Point settings. Some organizations customize controls based on traffic severity, with options to allow or deny traffic. Exemption policies allow organizations to exclude specific IPS signatures or traffic from inspection. This level of control is beneficial for organizations. I would rate this solution a 9 out of 10.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Technical Specialist at Softcell Technologies Limited
    Real User
    Top 5Leaderboard
    May 6, 2025
    Granular policy control enhances security while improved dashboards could boost threat analysis
    Pros and Cons
    • "Check Point IPS offers granular policy control, allowing administrators to customize IPS policies based on severity, protocols, or the source and destination."
    • "Improvements could include more attractive dashboards, visual analytics, and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification."

    What is our primary use case?

    The main use case for Check Point IPS is to protect against malicious attacks and cyber threats, whether they are known or unknown. It stops malicious traffic from entering the network or being executed, keeping the network safe. Check Point IPS provides protection against malware that should not execute in my client network, ensuring the network remains secure. With its intrusion prevention system, it matches signatures based on the database Check Point IPS has and acts accordingly to block both known and unknown threats. This way, the solution stays ahead of cyber threats.

    What is most valuable?

    Check Point IPS offers granular policy control, allowing administrators to customize IPS policies based on severity, protocols, or the source and destination. This provides flexibility and minimizes false positives. The integration with Check Point Threat Cloud ensures the IPS engine is updated with the latest attack signatures. Additionally, the solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines. Another feature is the integration with SmartEvent for centralized monitoring, logging, and reporting, enabling security teams to analyze attack patterns. High-powered processing hardware optimizes resource use, allowing all features including inspection, antivirus, and firewall security to be utilized efficiently.

    What needs improvement?

    Improvements could include more attractive dashboards, visual analytics, and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification.

    For how long have I used the solution?

    I have been using Check Point IPS for more than two years for operational purposes, including troubleshooting cases. I have extensive hands-on experience with IPS.

    What other advice do I have?

    Check Point IPS requires powerful processing hardware to handle the traffic load and inspection efficiently. Hardware resource optimization is crucial, and Check Point excels in this regard. Additionally, the customization of IPS signatures allows granular control, letting organizations decide on the handling of traffic based on their specific severity requirements. Exception and exemption policies can also be set to exclude certain traffic from IPS inspection. I rate the overall solution 8 out of 10.
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Bijja Maheshwar - PeerSpot reviewer
    Assistant Manager at Digitaltrack
    Real User
    Top 5
    Dec 31, 2025
    Intrusion prevention has secured our private network and provides clear visibility into threats
    Pros and Cons
    • "Check Point IPS has impacted my organization positively because it provides good security, visibility, and low false positives, along with being easy to deploy and manage."

      What is our primary use case?

      My main use case for Check Point IPS is to secure our private network architecture from threats and malicious activities.

      I have configured Check Point IPS in the security gateway and applied this security profile in the policies for LAN to WAN and LAN to outside or outside to LAN traffic, ensuring that all traffic is being inspected by Check Point IPS's Intrusion Prevention System. Whenever any malicious files or activities are detected, it straightforwardly blocks that traffic and generates an alert to the administrator. This is how I am securing our private infrastructure of the network.

      What is most valuable?

      The best features of Check Point IPS are its effectiveness, low false positive rate, and the visibility that it provides.

      Low false positives and visibility are among the best features in Check Point IPS because no genuine traffic is being blocked; whenever any malicious files are detected, only then does it block that traffic, and I am getting good visibility over the network.

      Check Point IPS has impacted my organization positively because it provides good security, visibility, and low false positives, along with being easy to deploy and manage. It has really impacted my organization positively and has improved efficiency.

      What needs improvement?

      I do not see a need for improvement at this time because Check Point IPS is working perfectly in my organization, and I do not see anything that needs to be added to the features.

      For how long have I used the solution?

      I have been using Check Point IPS for three years.

      What do I think about the stability of the solution?

      Check Point IPS is stable.

      What do I think about the scalability of the solution?

      Its scalability is good.

      How are customer service and support?

      Customer support is helpful and they are good in the technical aspects.

      How would you rate customer service and support?

      What was our ROI?

      There is a great rate of return for the organization, and I am saving both time and money.

      What's my experience with pricing, setup cost, and licensing?

      I had a great experience with the Check Point sales team, and it was easy to get the costing and licensing information for Check Point IPS.

      Which other solutions did I evaluate?

      I evaluated FortiGate IPS before choosing Check Point IPS.

      Which deployment model are you using for this solution?

      On-premises
      Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
      Last updated: Dec 31, 2025
      Flag as inappropriate
      PeerSpot user
      Abhijeet Chaskar - PeerSpot reviewer
      Cyber Security Analyst at Digitaltrack
      Real User
      Top 5Leaderboard
      Dec 17, 2025
      Automated threat intelligence has protected our network and prevented zero-day attacks
      Pros and Cons
      • "After implementing Check Point IPS, it has really reduced the incidents from a number of incidents to zero."

        What is our primary use case?

        Check Point IPS is used as a security feature to prevent zero-day attacks and the execution of malicious files in our network. Check Point IPS is an Intrusion Prevention System that prevents malicious and zero-day attacks based on real-time file transfers over the network.

        Based on the database of signatures and real-time analysis, it prevents our network from experiencing cyber threats and attacks.

        Check Point IPS is a security blade in our security gateway, which is Check Point. I have configured Check Point IPS as a security profile, and it has been mapped to our LAN-to-WAN security policy. Whenever any malicious traffic or activity is detected, the IPS detects it and blocks that traffic. That is the main use case for our organization.

        We have a security gateway where I have enabled this security feature. It is an inbuilt solution of the Check Point gateway.

        What is most valuable?

        The best feature is its automated threat intelligence, which is cloud-based. Its database receives automatic updates, so I do not have to manually perform any updates or handle anything related to threat signature updates. The second feature is its security capabilities, which effectively block malicious traffic.

        The automated threat intelligence feature is reducing our manual work and saving our time.

        We have had multiple security incidents that were secured by Check Point IPS.

        There was some malicious traffic that was blocked, and I could clearly see it in the logs. That was an incident, and Check Point IPS successfully blocked that traffic.

        After implementing Check Point IPS, it has really reduced the incidents from a number of incidents to zero.

        What needs improvement?

        Check Point IPS is working well for our organization. In the future, more automated and more AI-based intelligence could be fed into Check Point IPS, and that would be helpful for us.

        For how long have I used the solution?

        I have been using Check Point IPS for more than three years.

        What other advice do I have?

        Based on my experience and hands-on work, Check Point IPS is the best. I would rate this product a nine out of ten.

        Which deployment model are you using for this solution?

        On-premises
        Disclosure: My company does not have a business relationship with this vendor other than being a customer.
        Last updated: Dec 17, 2025
        Flag as inappropriate
        PeerSpot user
        SiddhanthSomkuwar - PeerSpot reviewer
        Penetration Tester at Digitaltrack
        Real User
        Top 5
        Oct 27, 2025
        Has prevented emerging threats and blocked malicious traffic through real-time detection
        Pros and Cons
        • "Check Point IPS offers one of the best cybersecurity features to detect malicious signatures trying to infiltrate our cloud devices, which could pose a problem to our network, acting as a security prevention mechanism."

          What is our primary use case?

          Our primary use of Check Point IPS is that this solution comes with the Check Point next generation firewall, which enables security features configured and enabled in our LAN to WAN policies. Any packet passing through the LAN network to our local network passes through by checking the IPS; anything with a malicious signature detected results in the IPS blocking that traffic.

          The process works with some predefined signatures in the Check Point IPS database that gets updates from the Check Point cloud. Any new signatures detected in the cloud are sent to Check Point IPS, and if any related signature matches the real-time network traffic, it detects and blocks it, ensuring that no malicious traffic passes into our private network.

          What is most valuable?

          Check Point IPS offers one of the best cybersecurity features to detect malicious signatures trying to infiltrate our cloud devices, which could pose a problem to our network, acting as a security prevention mechanism.

          The feature helps us catch threats and has a real-time detection capability for malicious threats, responding in a faster way.

          Check Point IPS has positively impacted our organization as we are able to detect and prevent emerging cyber threats, which I would describe as types of attacks.

          What needs improvement?

          I don't see any areas for improvement with Check Point IPS; everything is included.

          For how long have I used the solution?

          I have been using Check Point IPS for almost 2.5 years.

          Which solution did I use previously and why did I switch?

          We are currently using Check Point IPS; there is no prior solution.

          What's my experience with pricing, setup cost, and licensing?

          I was not part of the team presenting pricing and setup cost decisions, so I don't have specific information to comment on this matter.

          Which other solutions did I evaluate?

          Before choosing Check Point IPS, we were evaluating the Fortinet IPS solution.

          What other advice do I have?

          I will give Check Point IPS a score of nine out of ten.

          I chose nine instead of ten because I believe there is always something to improve.

          There are multiple positive outcomes, including our ability to detect and prevent emerging cyber threats.

          I rate Check Point IPS nine out of ten.

          Which deployment model are you using for this solution?

          On-premises
          Disclosure: My company does not have a business relationship with this vendor other than being a customer.
          Last updated: Oct 27, 2025
          Flag as inappropriate
          PeerSpot user
          Buyer's Guide
          Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.
          Updated: March 2026
          Buyer's Guide
          Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.