Check Point IPS protects against known and unknown vulnerabilities such as worms and trojans. I have used Check Point IPS to block threats by installing agents at the user end, which blocks known and unknown threats. Check Point IPS offers many predefined protections and virtual patching capabilities for applications at the user end.
Security Engineer at a computer software company with 11-50 employees
Has improved compliance and reduced time spent on patch updates and threat prevention
Pros and Cons
- "The sandboxing feature has helped my team significantly; whenever a threat is detected, it runs in the sandbox before entering the organization environment and provides a proper report that checks all services and installation details, showing what files get read."
What is our primary use case?
What is most valuable?
The best features Check Point IPS offers are the antivirus, URL filtering, and sandboxing. The sandboxing feature has helped my team significantly. Whenever a threat is detected, it runs in the sandbox before entering the organization environment. It provides a proper report that checks all services and installation details, showing what files get read. According to the sandbox report, if Check Point IPS gives a clean sheet, we can then install the particular application.
Check Point IPS has positively impacted my organization. After installation, I can see all third-party applications, virtually patch them, and access logs and reporting that provide proper and detailed information.
What needs improvement?
I do not think much needs to be improved in Check Point IPS currently, as I prefer it the way it is. If I had to pick one thing that could be better or something I would see added in the future, I cannot recall any specific features, but if there is anything in the roadmap, I would definitely use that particular feature.
For how long have I used the solution?
I have been using Check Point IPS for the past four years.
Buyer's Guide
Check Point IPS
January 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point IPS is very stable in my experience, with no issues regarding uptime or reliability.
What do I think about the scalability of the solution?
Check Point IPS's scalability is great, as it can handle growth and increased demand well because of the user-friendly dashboard and reporting functionality.
How are customer service and support?
The customer support for Check Point IPS is good. I reached out to customer support a couple of times, and the response has been very good. I would rate the customer support a nine on a scale of one to ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before Check Point IPS, we did not use any such application.
How was the initial setup?
Check Point IPS is deployed in my organization in the public cloud.
What was our ROI?
I have seen a return on investment with Check Point IPS, as it has reduced the time required from the resident engineer regarding updates and maintenance.
What's my experience with pricing, setup cost, and licensing?
Since pricing does not fall under my department as I am an IT engineer, I cannot comment on the pricing and licensing aspects.
Which other solutions did I evaluate?
Before choosing Check Point IPS, we evaluated other options including SCCM and ManageEngine.
What other advice do I have?
I would not add anything else about the features of Check Point IPS, as the detection and prevention capabilities are very good and the console is user-friendly. The advice I would give to others considering Check Point IPS is that they can definitely proceed with this solution because it is easy to use and user-friendly. I gave this review a rating of ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 8, 2025
Flag as inappropriateIT Cloud Learder at a security firm with 51-200 employees
Has improved threat prevention with proactive protection and seamless integration
Pros and Cons
- "Since implementing Check Point IPS, we've seen a significant positive impact, as the company no longer spends time worrying about threats like ransomware, allowing us to focus on our core operation with greater peace of mind, and it has also reduced the time our team spends managing incidents, making our security process more efficient overall."
- "One area that could be improved in Check Point IPS is the user interface for managing IPS policies, which can be a bit complex for new users, along with the need for faster signature updates for emerging threats and more seamless integration with third-party tools."
What is our primary use case?
My main use case for Check Point IPS in my company is to detect and block different kinds of activities around the trash or various vulnerabilities.
For example, I use Check Point IPS to detect or block activities when I encounter different malware or intrusions in my network area, and I need to block these with IPS technology.
In the past, another company in my group had a bad experience when they encountered different malware in their network area, blocking various databases, and this company didn't have any technology to stop this situation, so Check Point IPS helped in that instance.
What is most valuable?
One of the best features Check Point IPS offers is proactive protection, which I consider a great feature for IPS.
The proactive protection feature of Check Point IPS helps me and my organization by blocking ransomware and other malware, especially during an incident where different items get infected, showing its value in preventing such intrusions.
The integration of Check Point IPS with Check Point gateways and control in the Infinity Portal is another interesting feature that I find valuable.
Check Point IPS has positively impacted my organization since we no longer spend time worrying about threats like ransomware.
Since implementing Check Point IPS, we've seen a significant positive impact, as the company no longer spends time worrying about threats like ransomware, allowing us to focus on our core operation with greater peace of mind, and it has also reduced the time our team spends managing incidents, making our security process more efficient overall.
What needs improvement?
One area that could be improved in Check Point IPS is the user interface for managing IPS policies, which can be a bit complex for new users, along with the need for faster signature updates for emerging threats and more seamless integration with third-party tools. A simpler policy setup and faster updates would enhance the experience.
For how long have I used the solution?
I have been using Check Point IPS for about five or six years now.
What do I think about the stability of the solution?
Check Point IPS is stable.
What do I think about the scalability of the solution?
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
How are customer service and support?
In the past, customer support was so-so, but now it has improved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used a different solution before Check Point IPS.
What was our ROI?
I think about the time saved when considering the return on investment with Check Point IPS.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Check Point IPS is great because I had to read various documents to understand different situations, and it has been a great experience overall.
Which other solutions did I evaluate?
Before choosing Check Point IPS, I did not evaluate other options, as I preferred Check Point IPS for a long time.
What other advice do I have?
For others looking into using Check Point IPS, I would say it is a great company with excellent characteristics for handling vulnerabilities.
I would rate Check Point IPS eight out of ten because there are other things I don't prefer, such as the price and other aspects.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 13, 2025
Flag as inappropriateBuyer's Guide
Check Point IPS
January 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Cyber Security Analyst at a outsourcing company with 11-50 employees
Security gateway has provided autonomous threat prevention and now protects daily network traffic
Pros and Cons
- "Check Point IPS's cloud threat intelligence is outstanding."
What is our primary use case?
Check Point IPS is our main security feature within the security gateway, securing our network infrastructure and resources from cyber threats and zero-day attacks.
We have configured a LAN to WAN policy with Check Point IPS as a security profile applied to that particular security policy. Any traffic passing through from our private network to the WAN side, including downloads from users, files, applications, or website access, is checked to determine if it is genuine traffic or if it includes malicious content such as phishing emails or websites, which is then blocked by Check Point IPS.
What is most valuable?
Check Point IPS's cloud threat intelligence is outstanding. Check Point IPS is regularly updated from that intelligence regarding the signatures of current threats or CVE updates, so all threat intelligence is updated automatically, relieving us from the burden of manual updates, which is highly beneficial for our organization.
It has made our job significantly easier because we do not have to worry about updates or any manual tasks on Check Point IPS. After implementing Check Point IPS once and configuring it perfectly, there is no additional need for technical input from our side; it works independently at the configuration level.
Incidents of cyber attacks are genuinely blocked by Check Point IPS, and we can see this reflected in our logs captured by the solution.
Some of the malicious traffic requested by endpoint users is perfectly blocked based on threat intelligence, such as while downloading something from the internet. That incident demonstrated its effectiveness.
What needs improvement?
Check Point IPS is currently working perfectly for us, but in the future, the addition of AI or more automated reporting features could enhance the solution, and that would be beneficial.
For how long have I used the solution?
I have been using Check Point IPS for more than three years.
What do I think about the stability of the solution?
Check Point IPS has demonstrated no issues with reliability or instability in our daily activities; it is working well for us.
What do I think about the scalability of the solution?
Check Point IPS handles our organization's growth well with no scalability issues.
How are customer service and support?
I have had an excellent experience with Check Point IPS's customer team, as their technical knowledge and troubleshooting skills are excellent.
How would you rate customer service and support?
Positive
What other advice do I have?
I advise any organization to leverage Check Point IPS as a feature of the security gateway, which they can quickly configure and apply to a security policy, using it as a base solution for securing their network infrastructure. I would rate this solution a 9 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 23, 2025
Flag as inappropriateNetwork Security Engineer at a outsourcing company with 11-50 employees
Has prevented security breaches and reduces malicious activity through automated threat updates
Pros and Cons
- "We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved."
- "Check Point IPS can be more reasonably priced for small organizations; apart from this, everything looks perfect."
What is our primary use case?
My main use case for Check Point IPS is to prevent outside threats, malicious activities, and attacks, and for security purposes. With the help of Check Point IPS, our private network is secure.
A specific example of how I use Check Point IPS in my day-to-day work is that for any traffic coming through the LAN to WAN, all traffic is inspected and checked to ensure there is no malicious traffic flowing through. Whenever the end-user is downloading any file, it will also check for any threats inside the signature. All these security features are provided by Check Point IPS.
What is most valuable?
The best feature of Check Point IPS is its automated threat database update.
This feature helps my day-to-day work and overall security because we don't have to manually add or improve the security; whenever any threat signature comes worldwide, it is synced in real-time.
Check Point IPS has positively impacted my organization because after deploying it, we are seeing a lower number of security events happening and our users are very secure. Until now, no user has had a PC compromised from any threats or malicious activities.
What needs improvement?
Check Point IPS can be more reasonably priced for small organizations; apart from this, everything looks perfect.
For how long have I used the solution?
I have been using Check Point IPS for more than three years.
What do I think about the stability of the solution?
In my experience, Check Point IPS is stable.
What do I think about the scalability of the solution?
Check Point IPS's scalability is outstanding, so we don't have to worry about it.
How are customer service and support?
The customer support for Check Point IPS is supportive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point IPS; we are using the same solution.
What about the implementation team?
I was not part of the pricing, setup cost, or licensing experience.
What was our ROI?
We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved.
Which other solutions did I evaluate?
Before choosing Check Point IPS, we have evaluated other options.
What other advice do I have?
Regarding the decrease in security events, previously there were some incidents that happened, but after implementing the solution, we have not reported any single compromised device, so we are very secure now.
My advice for others looking into using Check Point IPS is that anyone looking for a solution that can prevent security events effectively can consider Check Point IPS as the best solution.
My company has a business relationship with this vendor other than being a customer, as we are partners.
I rate Check Point IPS nine out of ten because apart from the pricing, everything looks perfect.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 25, 2025
Flag as inappropriateTechnical Specialist at a outsourcing company with 501-1,000 employees
Has reduced threat events and protects our network with accurate signature updates
Pros and Cons
- "Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively as it has reduced threat events and requires less time to configure and manage."
- "The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved."
What is our primary use case?
We are using Check Point IPS for the security of our private resources and the overall organization network.
With the help of Check Point IPS, our organization network is protected in real time through the threat intelligence database that automatically gets updated from the threat cloud AI of Check Point IPS.
What is most valuable?
The best feature is that Check Point IPS not only prevents threats but also gets automatic signature updates from the Check Point threat cloud. It also has fewer false positives.
Whenever new vulnerabilities or CVEs come in the cybersecurity network, they are fed from the Check Point threat cloud. From their cloud threat center, the signature gets automatically updated into the Check Point Security Gateway where Check Point IPS is present. The signatures are accurate, which helps reduce false positives compared to many other IPS solutions.
Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively. It has reduced threat events and requires less time to configure and manage.
What needs improvement?
The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved.
For how long have I used the solution?
We have been using Check Point IPS for almost two years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
The support team is supportive, but sometimes in complex troubleshooting, they take time to resolve issues.
Which solution did I use previously and why did I switch?
We were using Sophos IPS before moving to Check Point IPS.
How was the initial setup?
The solution has reduced threat events and takes less time to configure and manage.
What about the implementation team?
We implemented this as a customer.
What was our ROI?
Time has been saved because the manageability is very easy.
Which other solutions did I evaluate?
We evaluated Fortinet IPS.
What other advice do I have?
I would advise anyone looking for an IPS solution to consider Check Point IPS as a solution. On a scale of one to ten, I rate this solution an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 24, 2025
Flag as inappropriateTechnical Specialist at a computer software company with 201-500 employees
Granular policy control maximizes flexibility while deep packet inspection identifies potential threats
Pros and Cons
- "I would rate this solution a 9 out of 10."
- "Improvement suggestions include more attractive dashboards, enhanced visual analytics, and automated attack path correlation in SmartEvent to improve situational awareness."
What is our primary use case?
The main use case for Check Point IPS is to protect against malicious attacks and traffic entering the network. Check Point IPS provides protection from cyber threats and malware that should not be executed in the client network, ensuring the network remains secure. It matches threats to signatures in its database and takes action to block known and unknown threats. Additionally, Check Point IPS enables deep packet inspection, allowing for easy decryption of traffic and identification of potential threats.
What is most valuable?
The granular policy control in Check Point IPS allows administrators to define customized IPS policies based on severity or protocols, providing flexibility and minimizing false positives. The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures. Behavioral heuristic analysis helps block zero-day attacks using AI-powered engines. Integration with SmartEvent provides centralized monitoring, logging, and reporting for IPS events, allowing security teams to analyze attack patterns. Check Point IPS also offers high-power processing hardware to handle the load of traffic inspection, ensuring that features like antivirus, firewall security, and IPS can be utilized efficiently without overburdening hardware resources.
What needs improvement?
Improvement suggestions include more attractive dashboards, enhanced visual analytics, and automated attack path correlation in SmartEvent to improve situational awareness.
For how long have I used the solution?
I have been using Check Point IPS for more than two years for operational purposes and troubleshooting cases.
What other advice do I have?
Check Point IPS allows for customization of IPS signatures with thousands of entries in the database. By default, it operates according to Check Point settings. Some organizations customize controls based on traffic severity, with options to allow or deny traffic. Exemption policies allow organizations to exclude specific IPS signatures or traffic from inspection. This level of control is beneficial for organizations. I would rate this solution a 9 out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 7, 2025
Flag as inappropriateTechnical Specialist at a computer software company with 201-500 employees
Granular policy control enhances security while improved dashboards could boost threat analysis
Pros and Cons
- "Check Point IPS offers granular policy control, allowing administrators to customize IPS policies based on severity, protocols, or the source and destination."
- "Improvements could include more attractive dashboards, visual analytics, and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification."
What is our primary use case?
The main use case for Check Point IPS is to protect against malicious attacks and cyber threats, whether they are known or unknown. It stops malicious traffic from entering the network or being executed, keeping the network safe. Check Point IPS provides protection against malware that should not execute in my client network, ensuring the network remains secure. With its intrusion prevention system, it matches signatures based on the database Check Point IPS has and acts accordingly to block both known and unknown threats. This way, the solution stays ahead of cyber threats.
What is most valuable?
Check Point IPS offers granular policy control, allowing administrators to customize IPS policies based on severity, protocols, or the source and destination. This provides flexibility and minimizes false positives. The integration with Check Point Threat Cloud ensures the IPS engine is updated with the latest attack signatures. Additionally, the solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines. Another feature is the integration with SmartEvent for centralized monitoring, logging, and reporting, enabling security teams to analyze attack patterns. High-powered processing hardware optimizes resource use, allowing all features including inspection, antivirus, and firewall security to be utilized efficiently.
What needs improvement?
Improvements could include more attractive dashboards, visual analytics, and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification.
For how long have I used the solution?
I have been using Check Point IPS for more than two years for operational purposes, including troubleshooting cases. I have extensive hands-on experience with IPS.
What other advice do I have?
Check Point IPS requires powerful processing hardware to handle the traffic load and inspection efficiently. Hardware resource optimization is crucial, and Check Point excels in this regard. Additionally, the customization of IPS signatures allows granular control, letting organizations decide on the handling of traffic based on their specific severity requirements. Exception and exemption policies can also be set to exclude certain traffic from IPS inspection. I rate the overall solution 8 out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 6, 2025
Flag as inappropriateAssistant Manager at a outsourcing company with 11-50 employees
Intrusion prevention has secured our private network and provides clear visibility into threats
Pros and Cons
- "Check Point IPS has impacted my organization positively because it provides good security, visibility, and low false positives, along with being easy to deploy and manage."
What is our primary use case?
My main use case for Check Point IPS is to secure our private network architecture from threats and malicious activities.
I have configured Check Point IPS in the security gateway and applied this security profile in the policies for LAN to WAN and LAN to outside or outside to LAN traffic, ensuring that all traffic is being inspected by Check Point IPS's Intrusion Prevention System. Whenever any malicious files or activities are detected, it straightforwardly blocks that traffic and generates an alert to the administrator. This is how I am securing our private infrastructure of the network.
What is most valuable?
The best features of Check Point IPS are its effectiveness, low false positive rate, and the visibility that it provides.
Low false positives and visibility are among the best features in Check Point IPS because no genuine traffic is being blocked; whenever any malicious files are detected, only then does it block that traffic, and I am getting good visibility over the network.
Check Point IPS has impacted my organization positively because it provides good security, visibility, and low false positives, along with being easy to deploy and manage. It has really impacted my organization positively and has improved efficiency.
What needs improvement?
I do not see a need for improvement at this time because Check Point IPS is working perfectly in my organization, and I do not see anything that needs to be added to the features.
For how long have I used the solution?
I have been using Check Point IPS for three years.
What do I think about the stability of the solution?
Check Point IPS is stable.
What do I think about the scalability of the solution?
Its scalability is good.
How are customer service and support?
Customer support is helpful and they are good in the technical aspects.
How would you rate customer service and support?
What was our ROI?
There is a great rate of return for the organization, and I am saving both time and money.
What's my experience with pricing, setup cost, and licensing?
I had a great experience with the Check Point sales team, and it was easy to get the costing and licensing information for Check Point IPS.
Which other solutions did I evaluate?
I evaluated FortiGate IPS before choosing Check Point IPS.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 31, 2025
Flag as inappropriateBuyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Fortinet FortiGate
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Trend Micro TippingPoint Threat Protection System
Palo Alto Networks Advanced Threat Prevention
Cisco IOS Security
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Palo Alto Networks URL Filtering with PAN-DB
Zscaler Cloud IPS
NSFOCUS NGIPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?

















