What is our primary use case?
Check Point IPS was implemented two years ago to protect our infrastructure from threats.
It began by being implemented in local environments with a reduced staff to carry out the corresponding tests and not cause a total company blockage. Once the tests were over, we gradually extended to different departments. We began to use Check Point IPS to be able to provide security of Internet to users using the IPS and anti-virus anti-bot modules, we also apply them to invite us to enter the company and thus monitor outgoing Internet traffic and thus avoid malicious users. Prevention and detection are one of the most valuable pillars of security.
How has it helped my organization?
This tool has allowed us to obtain complete reports of the applications' vulnerabilities, which helps us remedy these vulnerabilities presented by the organization.
It helped us a lot to monitor the internal traffic keeping monitored each server or user that enters the platform in this way Check Point IPS. It has allowed us to proactively reduce any incorrect configuration of network access that results from delegation.
One of the points where Check Point needs to improve is in the support they offer, since there we have had a few inconveniences.
What is most valuable?
The implementation of Check Point IPS brought a lot of value to our organization with all the characteristics that the tool shows, starting with great visibility in a single dashboard, which makes it much better. You don't have to go through different tabs.
Another feature is that it allows you to create multiple rule profiles. We can block directly from the outside without waiting to look at the logs.
With these and other features, Check Point IPS manages risk categories very well and accordingly helps us protect each of our devices in real-time.
What needs improvement?
It is always important to be improving the product to be at the forefront of technology.
One of the improvements that would be good is to improve the latency in the portal. When entering, it always takes a long time to load. Also, when the tool is already running, you feel a slight decrease in performance.
The application has many facilities when using the tool. The configuration of each of the policies should have filters.
We need to be able to understand and detect each of the vulnerabilities.
For how long have I used the solution?
This solution has been used for approximately two year in the company.
What do I think about the stability of the solution?
It's very stable. We never had any issues of it stopping to work. It's been very stable.
What do I think about the scalability of the solution?
We have not observed any significant performance impact on the firewall gateway by enabling the IPS module.
How are customer service and support?
The Check Point engineer we dealt with during setup had a lot of experience. His working knowledge helped us with the implementation.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
It is the first time that we've implemented a tool of this type.
How was the initial setup?
We implemented the product in-house with the aid of support as part of a POC.
A Check Point engineer who had a lot of experience helped us with the implementation.
What about the implementation team?
We implement the product internally with the help of support.
What was our ROI?
Attacks are prevented and detected based on severity, helping our organization eliminate compromising attacks. When making an investment with these tools, you are taking care of an important aspect that will double your profits.
What's my experience with pricing, setup cost, and licensing?
With Check Point, the IPS license could be included with the firewall product. Therefore the cost of the license is not huge.
Which other solutions did I evaluate?
Other solutions were not evaluated. We have always worked with Check Point products.
What other advice do I have?
One piece of advice is to have the latest database. You want to be protected against the latest attacks.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.