We are using Check Point IPS for the detection and prevention of threats for our PCI firewalls where it's mandatory to use it.
Network Security at a insurance company with 51-200 employees
High availability, helpful support, and effective management of devices and policies
Pros and Cons
- "The most valuable feature of Check Point IPS is the management of devices and policies."
- "Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns."
What is our primary use case?
What is most valuable?
The most valuable feature of Check Point IPS is the management of devices and policies.
What needs improvement?
Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns.
For how long have I used the solution?
I have been using Check Point IPS for over five years.
Buyer's Guide
Check Point IPS
September 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point IPS is stable.
What do I think about the scalability of the solution?
The stability of Check Point IPS depends on too many factors. It always depends on the usage and the traffic. However, we did not have any issues with scalability.
We have approximately 40 to 50 people involved in using Check Point IPS, such as the firewall and IPS managing teams.
How are customer service and support?
We have onsite engineers from the Check Point IPS directly on our site.
I rate the support from Check Point IPS a four out of five.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of Check Point IPS is straightforward because there are security profiles with default recommended configuration. However, these were beneficial at the time when produced but they are not that helpful anymore.
It can take some time to do verification because there are some protocols where you know that there could be problems. For example, for some of the sharing features, you have to be careful. Those there are the profiles you can use for the setup, you do have to do a lot of manual work to have everything work correctly.
I rate the setup of Check Point IPS a two out of five.
What about the implementation team?
We did the implementation of Check Point IPS in-house.
What's my experience with pricing, setup cost, and licensing?
There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive.
What other advice do I have?
We are replacing the IPS from Check Point with a different solution, which is related to the IPS functionality. The reason for the replacement is because Check Point IPS are at their end of life and are not creating or not using the security policy for the traffic, it mostly acts as an IPS.
We are planning on using Trend Micro. It will be better because there will be a dedicated device that is doing only the IPS. The performance will be better and it has a larger number of patterns updated weekly.
I have a very long and extensive experience with the Check Point ISP. It is a good solution, but sometimes it's causing issues, but it's a general problem for all the networks and security devices.
I rate Check Point IPS a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Cloud computing at Tech Data Limited
Great monitoring, less admin burden, and protects well against malware
Pros and Cons
- "There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network."
- "When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite."
What is our primary use case?
The company needed to improve its compliance with traffic risk management before all the company employees went full WFH.
This has turned into a more efficient operational control of internal traffic, where numerous threats had been identified while working in the office as most malware is somehow admitted by someone with access to the company network, either unintentionally or not. This actually drove revenue growth as fewer resources had to be spent from the IT department to fight cyber threats.
How has it helped my organization?
We've seen how this firewall has operated on real-time threats to both cloud and physical servers by detecting, neutralizing, eliminating, and then patching against malware.
We can test these patches post-deployment in less than one day. We'll then generate reports that include the activity for the time we desire and gauge the performance of the software.
From all this data, the IT department can determine future precautions, what kind of traffic will be blocked, and what users will be restricted.
What is most valuable?
We've been able to monitor all the devices in the network after activating and configuring the software blades. This shows us who's connected and who's not and how many disconnections there have been.
The firewall picks up malware traces that may have affected other users and networks and notifies when a particular site has been the source of infection.
There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network.
What needs improvement?
When exceptions need to be done for certain profiles, it is easy to get them done, however, implementation on some general ones may cause some extra work as the IPS is not easy to overwrite.
There are updates that have been scheduled that have been delayed more than expected, which impacts the performance of the firewall when the traffic is high. This can cause false positives and release alerts for harmless traffic, which results in a deviation of the attention from the security administrator when it's not relevant.
For how long have I used the solution?
We've used Check Point's complete protection package for our network for more than two years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point IPS
September 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Director Of Information Technology at a security firm with 1-10 employees
Helpful alerting, provides valuable network insights, and the pricing is negotiable
Pros and Cons
- "Overall, it give me a lot of insight into my network that I didn't have before."
- "The pain point that I have with this solution is contacting technical support."
What is our primary use case?
We primarily use Check Point to provide visibility into our network. It lets us see the east-west traffic, and it gives us a lot of information to work on as far as what kind of traffic was passing through.
How has it helped my organization?
Overall, it give me a lot of insight into my network that I didn't have before.
What is most valuable?
It lets us know about anomalous behavior and it provides alerts regarding activity on certain ports. It lets me decide, for example, whether something is a valid connection, or causes me to question why a certain port is open.
What needs improvement?
The pain point that I have with this solution is contacting technical support.
For how long have I used the solution?
I have been working with Check Point IPS for more than a year.
What do I think about the stability of the solution?
Stability-wise, this product is great.
What do I think about the scalability of the solution?
The scalability comes from the fact that this is an on-premises device that ties into a cloud service. It's a hybrid application. Once you have it installed, it's collecting information. You put it right there in front of your input into the network, and it picks up all of the traffic.
How are customer service and support?
Sometimes, technical support takes a long time to get back to you.
Which solution did I use previously and why did I switch?
I used Check Point Endpoint Security, as well as the Network Detect and Response (NDR) appliance.
I am currently using Darktrace and Vectra in addition to Check Point. I've been using all three and I find that Check Point is the one where I get the most information from. I will stop using Vectra this year but I will retain Darktrace, as long as they keep it at a certain price.
Darktrace takes a lot more configuration; unlike Check Point, there are a lot more changes that need to be made. When it's fully integrated, it requires a lot of time and it may end up being as useful as the Check Point.
The reason I keep all three is because they all give me a different kind of view. They all give me different information. If they gave the same information, it'd be useless to keep them.
With respect to similar security products, I have demoed CrowdStrike, worked with Symantec, and am also using Check Point.
How was the initial setup?
Check Point was fairly usable out of the box.
I am using an on-premises appliance that ties into a cloud service.
What's my experience with pricing, setup cost, and licensing?
Pricing for this solution is negotiable and I'm happy with our pricing.
I suggest negotiating either at the end of their fiscal year or at the end of every quarter. At the end of the quarter, they have an incentive to lower the prices to sell as many units as possible in order to meet their end-of-quarter quota.
What other advice do I have?
If I could only keep one of my security solutions, it would be Check Point. To me, it provides the most valuable information.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Easy to configure and setup with good scalability
Pros and Cons
- "Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
- "The cost is a bit high but it is worth it."
What is our primary use case?
The Check Point Intrusion Prevention System can block traffic from any source workstation inside our local network and facilitates the analysis of outbound traffic to check if there is any risk in the internal network in order to protect our clients and servers. With this product, we're creating a secure zone. We currently are using this blade in our hybrid environment and it's integrated with our secure gateway. Most of the time, our NOC team continuously monitors traffic in order to find any suspicious activity.
How has it helped my organization?
Now that the Check Point Intrusion Prevention System has improved our environment, we feel that we are more protected in our network. By implementing the recommendations that Check Point has given us, we have an optimal security environment now that provides almost real-time detection and prevention. We are protected by the Intrusion Prevention System and can go back and select any period or severity in order to display the latest statistics.
What is most valuable?
Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks. I also like that profiles can be applied to groups of workstations that need to be more protected from possible attacks. Each profile that we create has activated protections and some instructions of what the IPS should do with the traffic.
What needs improvement?
At the moment, I do not see what else can be added to this service. In my experience, I've seen that it has what we need without something additional being required.
It is easy to use, easy to configure, and practically updates itself without the need to intervene as an administrator of the appliance. We are happy with this platform since it allows us to have security and control over the connections almost in real-time. There are many different services that Check Point Intrusion Prevention System has that are quite useful.
For how long have I used the solution?
I've been using the solution for about four years.
What do I think about the stability of the solution?
I've found the stability to be good.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
Technical support has been great,
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
The initial setup was not complex.
What about the implementation team?
We handled the implementation process in-house.
What was our ROI?
I've witnessed a 40% ROI.
What's my experience with pricing, setup cost, and licensing?
The cost is a bit high but it is worth it.
Which other solutions did I evaluate?
I did evaluate other options before choosing Check Point.
What other advice do I have?
So far, I have no regrets about choosing this solution.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works
Easy to use, stable, and allows flagging if patterns are detected
Pros and Cons
- "IPS easily allows follow-up flags on recently updated patterns. If, in rare cases, a false positive does occur, it is quickly detected and an exception can be easily created."
- "I am not aware of a preview channel or some repository to have a preview on upcoming signatures, however, this would be nice to have."
What is our primary use case?
IPS is part of our Check Point Firewall Solution and a key function in securing our infrastructure. It is good to have an instance already on the gateway that protects specific services from attacks.
Very often, patch installations and downtimes cannot be implemented immediately in the case of critical security vulnerabilities.
IPS helps to secure short-term security vulnerabilities with its regular signature updates. The variety of products being covered is always impressive.
IPS is a key instance to secure services behind our Gateway.
How has it helped my organization?
Online attacks and malware have been evolving, using sophisticated and even evasive attack methods. Check Point addresses the changing threat landscape while meeting several key operational requirements for Intrusion Prevention Systems. Check Point IPS protections include checks for protocol and behavioral anomalies which means they detect vulnerabilities in well-known protocols such as HTTP, SMTP, POP, and IMAP before an exploit is found.
If you have any doubt if an update might interfere with any of your services, you can just mark it as "detect only" and observe how it behaves.
What is most valuable?
IPS easily allows follow-up flags on recently updated patterns. If, in rare cases, a false positive does occur, it is quickly detected and an exception can be easily created.
Basically, it is easy to use and offers a wide variety of protections through all kinds of software, services, appliances, and IoT-Devices. Updates are available regularly and can be easily downloaded and deployed through all the infrastructure. Rollback is easy to perform if ever something happens. It is a must-have on each gateway.
What needs improvement?
Usually, new signatures for known vulnerabilities come very quickly. In some cases, I would have liked the updates to be faster.
I am not aware of a preview channel or some repository to have a preview on upcoming signatures, however, this would be nice to have.
There is not too much else I am missing on Check Point Intrusion Prevention.
For how long have I used the solution?
We've used the solution for years now.
What do I think about the stability of the solution?
We have no concerns at all when it comes to stability.
What do I think about the scalability of the solution?
We've never reached a performance limit.
How are customer service and support?
Technical support is responsive and helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've worked with Check Point for years now.
How was the initial setup?
The setup process is straightforward. I'd recommend others join a CCSA training to cover the required knowledge.
What about the implementation team?
We implemented through our vendor and they were very experienced.
Which other solutions did I evaluate?
I've worked with other vendors before - however, of those that I've used, I found they didn't offer the whole package under one admin console.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Netwroking and Security Operations at a consultancy with 11-50 employees
A security solution that protects against the latest attacks with easy setup
What is most valuable?
The solution protects against the latest attacks. It is essential because collaborative tools and networks are necessary. The attacks are increasing, and we need protection in real time.
What needs improvement?
The support could be improved. We need quality information on the new products and solutions. We are implementing new solutions for Check Point, but these solutions are not thoroughly tested, which might lead to problems. If we had a lot of information and knowledge about the solution, it would be easier for us to implement it.
What do I think about the scalability of the solution?
The solution’s scalability is fine. When I escalate an issue, I appreciate their efforts and their support.
How are customer service and support?
The technical support is good. The engineers responsible for this area are expert people. The documentation in the knowledge base allows us to resolve issues. The blocks or columns help me understand what kind of issues they have.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have worked only with Check Point. We were a partner of Check Point in my last company. We provided solutions to customers and encountered different challenges because of other solutions. Fortinet was much cheaper than Check Point. The competition is based on price, whereas Check Point is superior in quality and security.
How was the initial setup?
The initial setup is easy and intuitive.
What's my experience with pricing, setup cost, and licensing?
The solution has a high cost, but the relation between price and quality is okay.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Helps to detect attacks and prevent them
Pros and Cons
- "The product's initial setup is easy."
- "I would like the product to provide us with intelligence to understand what we really have in our environment."
What needs improvement?
I would like the product to provide us with intelligence to understand what we really have in our environment.
For how long have I used the solution?
The solution helps us to detect attacks and prevent them.
What do I think about the scalability of the solution?
The solution does not scale well.
How are customer service and support?
We have had problems with the management.
How would you rate customer service and support?
Neutral
How was the initial setup?
The product's initial setup is easy.
What other advice do I have?
I would rate the product an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Good functionality, real-time protection and reduction in costs
Pros and Cons
- "Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security."
- "Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details."
What is our primary use case?
We first saw that this blade was available to use in our Check Point gateway. Later, we understood that there are advanced threats that are in charge of exposing weaknesses. We did not have our perimeter completely covered, which is why we decided to use this technology.
This technology helps us to detect and prevent attempts at exploiting vulnerabilities. It also helps a lot as the tool poses very few false positives, giving the tool good credibility.
How has it helped my organization?
Check Point IPS has helped us to have greater perimeter security through our Check Point Gateway. It offers us an easy implementation and has great protection across our infrastructure.
By means of Smart Events, we can carry out very advanced monitoring of the threats that have tried to enter our infrastructure.
It is a great tool. It is totally recommended by us. It really covers many areas of security, such as anti-malware, data loss, improper use of protocols, and preventing known exploits.
What is most valuable?
One of the characteristics that we liked the most is the functionality and easy implementation via the Check Point Gateway.
The cost is reduced to being a blade. That is a good detail of the product in terms of licensing.
Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.
Also, a very good feature is the optional mode of putting it only in detection mode. They are ensuring in that sense that they are not so intrusive at the beginning of the implementation in production environments.
What needs improvement?
Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details. In addition to extending some implementations, it would be good for Check Point to keep its documentation public and updated.
This product, as a blade, does not include the license with the Check Point gateway.
Some errors are generated in the implementation of the Smart Cloud in the Infinity Check Point Portal. When that happens, cases of withdrawal must be carried out without embargo for a long time in response.
For how long have I used the solution?
We have been using this solution for about two years and have received the expected results. We are satisfied with the product.
Which solution did I use previously and why did I switch?
Previously we did not use another brand or tool. This is our primary solution now.
Which other solutions did I evaluate?
We did evaluate other options. It is always important to evaluate various options to see how they adapt to the client's system and infrastructure.
What other advice do I have?
We recommend the product. It is highly safe and easy to use.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Fortinet FortiGate
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Palo Alto Networks Advanced Threat Prevention
Trend Micro TippingPoint Threat Protection System
Cisco Secure IPS (NGIPS)
Cisco IOS Security
Palo Alto Networks URL Filtering with PAN-DB
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?