No more typing reviews! Try our Samantha, our new voice AI agent.
Jeroen Devroede - PeerSpot reviewer
IT Network Administrator at DHL
Real User
Aug 3, 2023
A stable tool that provides its users with intrusion protection functionalities
Pros and Cons
  • "The most valuable features of the solution are that the product's stability has been very good. The"
  • "I hear from my admin that the firmware upgrade process is quite cumbersome."

What is our primary use case?

In my company, we use Check Point IPS for its intrusion protection functionalities. The product is the core of our security infrastructure that we use to filter and block attempts for connection into resources, which usually you want to happen only for specific administrative roles.

What is most valuable?

The most valuable features of the solution are that the product's stability has been very good. The product's uptime has been massive, and there has not been any downtime, making it a very good product. Our company has had a six-year uptime record with Check Point IPS. The firewall has not caused a single second of outage while functioning to protect access to our data center.

What needs improvement?

Based on what I hear from my full-time firewall administrators, the upgrade process or the maintenance of the devices for each firmware upgrade requires one to break the cluster and run a specific moment at a time, a single node concept. I hear from my admin that the firmware upgrade process is quite cumbersome. Our company has made Check Point very well aware of the cumbersome firmware upgrade process, including the other customers as well. The aforementioned details can be considered for improvement.

The price of the product needs to be improved since it is an expensive solution. All the components of Check Point IPS are expensive, while licenses of the product exceed all its other expenses. If you have a data center without infrastructure, you will suffer from losses on a monthly and yearly basis due to DDoS attacks, which we know about since we have the data for ourselves. It is up to each customer to determine how long he can lose his data center, and then you count if it is possible to lose it for that amount of time, and if you don't, then pay the price for the firewall.

For how long have I used the solution?

I have experience with Check Point IPS.

Buyer's Guide
Check Point IPS
March 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.

What do I think about the stability of the solution?

Stability-wise, it is a good solution since we haven't faced any outages in our company.

What do I think about the scalability of the solution?

With MCO solution, Check Point IPS is super scalable since we can spawn virtual firewalls and provide additional CPUs to one particular firewall. Check Point IPS is a SUSE firewall solution where you can launch virtual firewalls within the SUSE, making the product very flexible and versatile.

There are thousands of end users of the solution in my company, which is a major airline company.

My company plans to increase the solution's usage since we have thousands of users.

For the deployment and maintenance, there is a need to provide twenty-four hours and seven days a week coverage. Per cluster, you would need three people for maintenance. If you have twelve nodes split across six clusters, you need six persons and one manager for maintenance.

How are customer service and support?

I have contacted the solution's technical support for solutions like Check Point IPS since it provides two ways to make a change in infrastructure, which you can find in its GUI. If it is not there in the GUI and doesn't work from the moment you need CLI, then you create a technical case to have the vendor watch your actions while you do it, which applies to Cisco controller-based networking. It either works via the GUI, and if it does not, you almost always create a tech case in the case of Cisco or a technical support case in the case of Check Point to have somebody from the technical support assist you. Cisco or Check Point products are no longer meant to be run without support.

How was the initial setup?

The initial setup of Check Point IPS was complex. The nature of the product is such that the setup phase is complex since one needs to insert a firewall into all the connections. One cannot implement a firewall partially since that is completely useless. When one implements Check Point IPS, it is necessary to ensure that all of the traffic goes through it, making the implementation complex, but that's not Check Point's fault since it is the nature of the IT landscape.

The deployment process takes at least three months.

Regarding the deployment process, you install the boxes in a lab environment or a DMZ. In the second step, you upgrade the firmware to the last version you want to have the firewall because you wouldn't want to do that after it has been put in your network. From the moment you have the base setup, you separate the cluster again and distribute it across your data centers, after which you can start activating the firewalls. Basically, what you do is that you install them, cluster them, and in the final stage, you implement or migrate from an existing rule set from another firewall onto the new firewalls. The rule set is super crucial because you cannot start with a blank rule set in a production environment, and you cannot build it up from scratch. Either you get a rule set from somewhere else or build it up manually, which will require massive work.


What about the implementation team?

The implementation process is always done with the help of a third party.

What was our ROI?

If my data center goes down for more than 15 minutes, we lose one million euros in operational costs, meaning our company's return on investment is immediate. If you do not have a firewall infrastructure that protects your data center today, you will suffer outages due to attacks. If you consider one million euros per fifteen minutes, it is clear that my company experiences a clear ROI using the solution.

What's my experience with pricing, setup cost, and licensing?

My company pays for the yearly licensing of Check Point IPS. It is a very expensive tool. Anything that falls under the security-related aspect, including Cisco products, is very expensive.

What other advice do I have?

Our company has been expanding the use of Check Point IPS. We currently have twelve nodes, and we are considering expanding them. We continue to have Check Point IPS in our company, and we even changed from physical devices to virtual devices, including MCO solutions.

Considering how Check Point has evolved as a company, I would definitely recommend the solution to those planning to use it. Now, we are investigating the competitors of Check Point to have a better position when we negotiate prices. We also work with FortiGate in our company. If you look at FortiGate or Check Point, they are the top-line products in the firewall industry at the moment. Check Point is like a top-level provider of firewall solutions.

Overall, I rate the solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mamadou Fallou Diagne - PeerSpot reviewer
IT security and network analyst at Revenu Québec
Real User
Top 10
Apr 6, 2023
Efficiently protects workstation, but some lacks automation features
Pros and Cons
  • "It is easy to configure."
  • "It requires a lot of people to maintain the solution."

What is our primary use case?

Our primary use case is to protect the workstation. The IPS blade is integrated into our Check Point environment. We have many blades in Check Point IPS representation, each with a specific function.

What is most valuable?

The most valuable feature is very good and easy to use. Configuration is straightforward, and support is fast, usually within one hour. The IPS blade is integrated into our Check Point environment and is used for intrusion prevention.

What needs improvement?

There is room for improvement in the pricing model, and it can be more competitive.

Moreover, another area of improvement is in the maintenance of the solution because it requires a lot of people to maintain the solution. Some tasks can be automated, and I would like to see a feature where we can automate the tasks.

For how long have I used the solution?

The company has been using Check Point for around 20 years, and I have been with the company for two years. The IPS blade is integrated with Check Point, and we use R81.20.

How was the initial setup?

The initial setup is straightforward. It is easy to configure.

What about the implementation team?

The solution requires proper maintenance because there are several tasks to check for updates and more. We have five people on the maintenance team. Our company has many firewalls since it is big, and the number of endpoints is more than 5000. Moreover, we have various roles like engineers, system administrators, or network administrators.

What other advice do I have?

I would give Check Point IPS a seven out of ten. We started using this product a year ago, and it has worked well for us.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point IPS
March 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,444 professionals have used our research since 2012.
Head of IT at RD Tech
Real User
Top 5Leaderboard
Apr 8, 2024
Offers secure network and acts as a security guard
Pros and Cons
  • "The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network."
  • "The tool's pricing could be better."

What is our primary use case?

I have been using the product as an antivirus. It acts like a security guard, stopping bad things from getting in and ensuring only the right stuff gets through.

What is most valuable?

The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network. 

What needs improvement?

The tool's pricing could be better.

What do I think about the stability of the solution?

I rate the tool's stability a ten out of ten. 

What do I think about the scalability of the solution?

The solution is 100 percent scalable. My company has 150-200 users, and we plan to add 100 more users in the future. 

How are customer service and support?

The tool's technical support is good. 

How was the initial setup?

The setup process itself is straightforward, but configuring it can be complex due to the complexity of our network. It can be completed in two days. 

What about the implementation team?

The tool's deployment can be done in-house. 

What was our ROI?

We can get 100 percent ROI from using the product. 

What's my experience with pricing, setup cost, and licensing?

The tool's licensing model is good. The licensing costs are yearly. I rate it an eight out of ten. 

What other advice do I have?

The solution exceeded our expectations. The Check Point IPS works with other security solutions, such as Ubiquiti and Bitdefender. Each product has its role in securing our network, devices, and users. We also use Microsoft Active Directory. I rate the tool a ten out of ten. You need to spend time and understand the product's capabilities. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2540445 - PeerSpot reviewer
Student at a university with 5,001-10,000 employees
Real User
Top 5
Oct 20, 2024
Effortless configuration with deep packet visibility across layers
Pros and Cons
  • "Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations."
  • "From the product perspective, there have been instances where the signature download caused issues."

What is our primary use case?

Initially, the requirement was just to have a stateful inspection firewall to control traffic entering our network. Later, we needed deep packet inspection to look into packets deeply to identify any kind of malicious content. This led us to start using Check Point IPS to have visibility across all the seven layers of traffic entering the network.

How has it helped my organization?

The solution is consumed by our SOC to ensure we have visibility into traffic entering our network. With IPS's logs, we began to get a lot of visibility into the type of traffic flowing into our network. It fulfills our SOC's need and has become our standard for deep packet inspection, which is easy to deploy.

What is most valuable?

Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations.

What needs improvement?

From the product perspective, there have been instances where the signature download caused issues. However, it happened only once, and some QA is needed on signatures. Overall, the product is robust.

For how long have I used the solution?

I have had experience with Check Point IPS for ten years now.

What do I think about the stability of the solution?

The stability of the solution is excellent. There haven't been any issues after enabling certain features, and it hasn't caused outages in traffic. During certification, we considered exceptions to avoid IPS inspection for legit traffic.

What do I think about the scalability of the solution?

Scalability depends on hardware platform certification. Check Point's Maestro solution allows up to thirty-four firewalls in a load-sharing configuration. Properly sizing the appliance for IPS makes it a scalable solution.

How are customer service and support?

Customer service is a significant drawback. Support is challenging during weekends, and support personnel often require unnecessary details, slowing resolution processes.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We use both Check Point and Palo Alto. Palo Alto is more expensive, with a front-end focused design lacking on the CLI. Check Point provides flexibility with Linux commands, reducing deployment hassle.

How was the initial setup?

Setup is straightforward, rated as ten on a scale of one to ten. Configuration involves enabling the IPS feature and publishing changes, identical to setting up a firewall.

What about the implementation team?

Three engineering team members worked on solution certification. The operations team, supported by four to five people, ensured deployment across global firewalls during limited change windows.

What was our ROI?

The solution fulfills the SOC's need for visibility and easy deployment of deep packet inspection, with no operational impact reported.

What's my experience with pricing, setup cost, and licensing?

As a global customer, we receive decent discounts and expand our infrastructure using the solution. There have been no pricing issues.

Which other solutions did I evaluate?

We also evaluated Palo Alto and previously worked with Juniper long ago. Palo Alto has a steeper learning curve with proprietary terms not aligned with industry standards. Check Point follows standard conventions, simplifying deployment.

What other advice do I have?

Check Point IPS is a preferable solution for its price, stability, and deployment ease compared to more complex solutions.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Tshidiso Sehloho - PeerSpot reviewer
ICT Security Consultant at National Treasury of the Republic of South Africa
Consultant
Dec 22, 2023
Robust network security with comprehensive protection, and continuous improvement, offering advanced features like signature-based detection, behavioral analysis, and mobile solutions
Pros and Cons
  • "It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention."
  • "Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS."

What is our primary use case?

The primary use cases include application security control, comprehensive security management, and proactive protection against a wide range of threats. It serves as a crucial component for safeguarding applications and ensuring overall security effectiveness. It contributes to proactive protection and plays a pivotal role in firewall protection strategies.

How has it helped my organization?

The focus is on safeguarding the departmental environment, and it is effectively fulfilling its role in environmental protection.

What is most valuable?

It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention.

What needs improvement?

Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS.

For how long have I used the solution?

I have been working with it for ten years.

What do I think about the stability of the solution?

It offers excellent stability. I would rate it ten out of ten.

What do I think about the scalability of the solution?

I would rate its scalability abilities nine out of ten. Currently, 1,800 users within our organization actively use it.

How are customer service and support?

I would rate its customer service and support nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup can be somewhat intricate, involving coordination with the OEM and service provider. I would rate it a six out of ten.

What about the implementation team?

For the deployment, we conducted a refresh last year, which took approximately two to three weeks to complete. It is essential to have at least two individuals involved in the process, with one requiring additional expertise. This team typically consists of a Check Point specialist, an expert, and an administrator.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite reasonable.

What other advice do I have?

It is highly efficient and it provides a mobile solution for various devices, including cell phones and iPads, catering to mobile workflows. The system is not only efficient but continually improving. I would certainly recommend it. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
AnkurSharma3 - PeerSpot reviewer
Cyber SOC Manager at Tower Research Capital
Real User
Top 5
Dec 8, 2023
A complete solution for intrusion prevention and identify the traffic behavior but lacks scalability

What is our primary use case?

We use the Check Point IPS for intrusion prevention. It was installed inline. This solution enabled us to stop all threats and intrusion activities across the data center. The IPS uses a signature-based approach to control traffic, allowing only authorized traffic to flow outside. However, it can also identify the traffic behavior and enforce the policy based on that behavior, protecting against even new and unknown threats.

What is most valuable?

The docking of the IPS engine can be improved.

For how long have I used the solution?

I have been using Check Point IPS for three years.

What do I think about the stability of the solution?

The product is stable.

I rate the solution’s stability an eight out of ten.

What do I think about the scalability of the solution?

I rate the solution’s scalability a five or six out of ten.

How are customer service and support?

Technical support is awesome.

Which solution did I use previously and why did I switch?

I’ve used Cisco. It is very hard to configure and manage the day-to-day operation. It was entirely controlled by the CLI, like the command line interface. Compared to Check Point, it was wholly managed using the GUI. We can finetune and customize the signature. This feature is available in the Check Point.

How was the initial setup?

The initial setup is not so difficult. It takes two and a half months to complete.

I rate the initial setup a six out of ten, where one is difficult, and ten is easy.

What other advice do I have?

I recommend using the out-of-path installation of this tool. Then, find the desired signature and fine-tune the exception based on your specific environment, including the port involved. Once done, bring the tool line into the traffic. Finally, enable the signatures one by one instead of relying on a single group containing older signatures.

The solution has the inherent complexity of managing IT infrastructure and configuring Check Point IPS. The Signature Management requires manual customization to adapt to your network traffic conditions. Building and customizing signatures is a complex and demanding task.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1855911 - PeerSpot reviewer
Network Engineer at VSP Vision Care
User
May 11, 2022
Details vulnerability data, protects against malicious attacks well, and easy search capabilities
Pros and Cons
  • "It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security."
  • "The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact."
  • "The dashboard reports can be easier to generate and customize."
  • "Out of the box, the number of built-in reporting and dashboards related to the IPS logs and events has room for improvement."

What is our primary use case?

We use the Check Point IPS module on various firewall gateways.  Specifically, we use the IPS on our DMZ firewall gateway to protect our DMZ servers from the inbound Internet traffic.  

For our user outbound Internet traffic, we use the IPS and the anti-virus anti-bot modules, in addition to the base IPS module to protect the network traffic.  

We also apply the product to our guest firewall gateway to monitor outbound internet traffic, with a focus to avoid any malicious guest users using our guest internet services to launch attacks.

How has it helped my organization?

The Check Point IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users.  

We have configured the Check Point IPS modules so all the downloaded updates would turn to monitor-only mode.  Once the updates have been in use for a couple of weeks, then we would review the IPS signature, and turn them into prevent mode based on factors such as the severity of the vulnerability, the performance hit to the firewall gateway, the chance of false positives, and the relevance to our environment. This allows us to easily maintain up-to-date network protection with a lower chance of unexpected business interruption.

What is most valuable?

The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.  

It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security. 

Also, you can easily search through thousands of IPS signatures using various keywords is another feature worth noting.

What needs improvement?

Out of the box, the number of built-in reporting and dashboards related to the IPS logs and events has room for improvement. The dashboard reports can be easier to generate and customize.  

It would also be nice if the system would allow some form of alerting when specific signatures have been triggered X number of times within Y amount of time. This would allow us to be better notified when there is a security attack going on, without too much of false-positive alerts. 

Another would-be-nice request is to have more details information about how the signatures would detect the specific security vulnerability. This allows us to make a judgment about how useful a particular signature is in our specific environment.

For how long have I used the solution?

I've used the product for over ten years.

What do I think about the stability of the solution?

The stability should be high as we don't have many issues with the IPS solution.  In the last couple of years; we only had one issue due to a bad signature.

What do I think about the scalability of the solution?

We have not observed any major performance hit to the firewall gateway by enabling the IPS module. Of course, some signatures did indicate a high-performance hit to the gateway, in which we typically won't turn on those signatures unless there is a strong need.

How are customer service and support?

Good technical support is by chance/luck. Sometimes you run into good tech support. Other times you may run into someone that doesn't know much more than yourself.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We also have extensive experience with the Cisco Firepower solution. We actually use both solutions in our environment.

How was the initial setup?

The initial setup is pretty simple so long you just follow the default steps, without too much worry about going through the thousands of signatures manually.

What about the implementation team?

We did a self-install.

What's my experience with pricing, setup cost, and licensing?

With Check Point, the IPS license could be bundled with the firewall product and so the license cost is not huge. 

It does take time to get familiar with the UI and understand the "workflow" that Check Point has in mind when designing the solution. A good understanding of this would allow an easier adoption.

Which other solutions did I evaluate?

We use both Check Point's and Firepower's solutions in our data center.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Greg Tate - PeerSpot reviewer
Information Technology Operations Manager at a computer software company with 51-200 employees
User
Feb 2, 2022
Great for detection and access with the capabilities of defining specific rules
Pros and Cons
  • "We are able to define our own rules for detection."
  • "Dome9 has paid for itself through the cost savings of additional headcount."
  • "Support is the biggest area for improvement."
  • "Support is the biggest area for improvement."

What is our primary use case?

We wanted a more robust solution for controlling access to our cloud environments (AWS and Azure). In addition, we wanted our control to be cloud-based. 

Our thought was to find a solution to aid us in being proactive as well as reactive. We have multiple environments in multiple clouds with some areas having delegated administration. The solution we needed was one to reduce the need for administrative headcount to continuously review any misconfiguration. Beyond that we were looking to find a solution for SASE.

How has it helped my organization?

The product has allowed us to proactively mitigate any network access misconfiguration resulting from delegation. 

We didn't have to hire an additional network administration resource to focus on detecting any misconfigurations. Dome 9 has assisted through the pre-canned compliance templates. 

We are able to define our own rules for detection. 

In addition to the Harmony Connect Endpoint bundled VPN, the Harmony Connect SASE is continuing to reduce reliance on traditional VPN to the point we will likely discontinue the use of the bundled VPN.

What is most valuable?

In terms of valuable features, it's hard to choose one. Dome9 and Harmony Connect have both been great in detecting and solving access issues.

As mentioned elsewhere in this review, the Harmony Connect SASE has been extremely valuable in improving our security posture and moving us to a zero-trust mindset (organizationally speaking).

Also, as mentioned, Dome9 has paid for itself through the cost savings of additional headcount. If we didn't have Dome 9, we would keep an additional headcount for the single purpose of detecting network changes within the environment. 

What needs improvement?

Support is the biggest area for improvement. Check Point is responsive, however, their support agents seem to be very siloed in their ability and/or product knowledge. It takes time and escalation to get through most tickets as they are passed from one group to another and then back again. We are able to navigate our support issues with the aid of our account team, so I want to underscore that support is indeed responsive. However, the processes support techs have to follow seem to be the root cause of the support response issues. 

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

This is where Check Point needs to get operations ironed out. Stable Check Point products are items that haven't been acquired recently. Recent acquisitions seem to lack cohesive functionality.

What do I think about the scalability of the solution?

From what we've encountered, scalability isn't an issue.

How are customer service and support?

Support seems siloed in knowledge, As a result, most support requests require additional management. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We previously used a different solution, however, it was costly and didn't provide the same functionality.

How was the initial setup?

The setup was difficult given the number of products and the lack of a cohesive user experience.  

What about the implementation team?

We implemented the product in-house with the aid of support as part of a POC.

What was our ROI?

We noted ROI after one year.

What's my experience with pricing, setup cost, and licensing?

It seems, as with other services of this nature, opting-in on the bundled licensing is the best bet. I'd suggest looking at the Infinity Plan. 

Which other solutions did I evaluate?

We evaluated Cisco, Juniper, and Palo Alto.

What other advice do I have?

Make sure you have a good vibe from your sales team. They tend to support you in the long run. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.