It has allowed us to provide protection that we did not have before. We have tested and reviewed different solutions throughout the year to establish the best solution that would allow us to meet internal demands based on the products our organization sells and makes available from third parties. We need to protect information from those catalogs the database users who are willing to purchase services with us and at the same time we need to keep them protected. We need a safeguard from cyber threats to reduce downtime in costs associated with attacks and a potential loss of communication against our services in the data center.
Perimeter Security Administrator at a security firm with 51-200 employees
Great protection from cyber attacks and DDoS with reduced downtime
Pros and Cons
- "Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
- "There is an issue with precision."
What is our primary use case?
How has it helped my organization?
Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization. We get an environment with protected data centers where there is no interruption of services and no significant loss (including reputational loss) to our company.
What is most valuable?
By having a solution that allows us to protect systems and data from cyber attacks or unauthorized instructions (including malware and DDoS attacks), we can protect our system from all kinds of threats. Check Point reduces downtime and costs associated with attacks that cause communication losses and guarantees compliance with security. It also ensures the privacy of all the data that we have stored, which helps us maintain a high level of reputation when it comes to careful administration and data segmentation. Now, there is a formalization of data protection. Check Point is really compatible with the internal needs of our organization, and its features offer us a great advantage.
What needs improvement?
There is an issue with precision. There is room for improvement based on the type of threats that are constantly evolving. They need to ensure they are managing to keep up with threat changes and generate some new approaches.
Another feature that I would like to see as a substantial improvement is the expansion of support in cloud environments. We need to ensure we can have access to public and private clouds and need to be able to include integrations with different popular providers.
They need to offer IoT as device support.
Buyer's Guide
Check Point IPS
January 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Database Administrator at a tech services company with 1,001-5,000 employees
Great unified system with impressive protection and helpful support
Pros and Cons
- "Real-time protection has blocked most threats that could affect system operations."
- "The cost is high."
What is our primary use case?
This tool seals any loopholes that could be detected by ransomware attackers and may lead to data loss. It has protected the organization from potential vulnerabilities affecting operations and the slowdown of workflows. It ensures that the applications are performing efficiently based on the set objectives. It delivers many signatures that enable teams to ascertain the security situations in various departments. It saves the organization a lot of costs since it is less costly and more powerful than many versions in the market.
How has it helped my organization?
Digital transformation has been efficient and productive thanks to the operation of this great product. After the implementation of IPS, there is increased production, and teams can easily focus on more productive tasks without fear of being attacked by cybercriminals. We have accelerated operations with the modern data management models that come with this application. It is easy to detect threats in advance and plan effectively how to eliminate them. Our organization has been secure since we deployed this tool without cases of external attacks.
What is most valuable?
Most features in this platform have been of great importance in the organization. The unified system controls the security situation in any system, reducing the total cost of ownership. Real-time protection has blocked most threats that could affect system operations. It can detect and prevent the entry of known and unknown data vulnerabilities.
The customer support services are efficient and have always helped us achieve most goals. The platform provides continuous cyber security reports that enable us to plan and make informed decisions.
What needs improvement?
The set features have played important roles in transforming the organization to meet the basic security standards.
The cost is high. That said, depending on the company's size, there can be a mutual agreement for efficient licensing terms. We are satisfied with the set performance parameters that have enhanced the smooth running of workflows.
The team should focus more on timely updates and configuration processes that sometimes may fail. I like the performance of this product and the achievements we've made so far.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It is stable, and I recommend it.
What do I think about the scalability of the solution?
I am impressed by the performance.
How are customer service and support?
The customer support staff is always supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a different solution.
How was the initial setup?
The initial set up was not complex.
What about the implementation team?
Implementation was done through the vendor.
What was our ROI?
There is increased ROI.
What's my experience with pricing, setup cost, and licensing?
The setup cost is good.
Which other solutions did I evaluate?
I have not evaluated other options.
What other advice do I have?
The security measures are effective and I'd recommend the product to companies seeking great performance.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point IPS
January 2026
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Soporte técnico superior at a financial services firm with 51-200 employees
Great visualizations with helpful event analysis and centralization features
Pros and Cons
- "Its event analysis and centralization features are very important for any organization."
- "I would like to have the possibility of adding features to this IPS solution in the future."
What is our primary use case?
This solution allows us to achieve a healthy network and good security within our organization given its functions, management, and control. The level of detection and intelligent algorithms that protect against distributed attacks have helped us to secure ourselves and provide protection in real time. These capacities and needs complement our security based on a scheme that our fund or financial distribution can achieve under annual or quarterly protection measures (or every three years).
How has it helped my organization?
Check Point offers us good protection. It has also allowed us to acquire services and products under a scheme that allows us to put together, as if it were, an offering of different functions or characteristics, giving added value to each one of them when they connect to each other. It is a solution that we can constantly build with each of the blades that we add. This makes it possible for us to have savings based on the security structure that we need for the organization. Thus it is a solution that has saved us significantly in additional investment when dealing with security.
What is most valuable?
Speaking of the IPS solution, it is important to understand that each of these features is based on real-time detection, analysis, and centralization of events. We were able to interpret that the solution is a total complement to each of the needs that any organization may have. Its event analysis and centralization features are very important for any organization. Those allow you to generate a general visualization, making a complete panorama of each of the events that you have inside your security system.
What needs improvement?
I would like to have the possibility of adding features to this IPS solution in the future. It allows us to reach and integrate with other solutions that we have in the same portfolio of this security provider. It has the possibility of achieving and integrating the detection and analysis of this equipment against the integration and analysis that is done in the final devices, generating a correlation and installation of agent propagation from an internal security center.
For how long have I used the solution?
I've used the solution for four years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a insurance company with 1,001-5,000 employees
Details vulnerability data, protects against malicious attacks well, and easy search capabilities
Pros and Cons
- "It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security."
- "The dashboard reports can be easier to generate and customize."
What is our primary use case?
We use the Check Point IPS module on various firewall gateways. Specifically, we use the IPS on our DMZ firewall gateway to protect our DMZ servers from the inbound Internet traffic.
For our user outbound Internet traffic, we use the IPS and the anti-virus anti-bot modules, in addition to the base IPS module to protect the network traffic.
We also apply the product to our guest firewall gateway to monitor outbound internet traffic, with a focus to avoid any malicious guest users using our guest internet services to launch attacks.
How has it helped my organization?
The Check Point IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users.
We have configured the Check Point IPS modules so all the downloaded updates would turn to monitor-only mode. Once the updates have been in use for a couple of weeks, then we would review the IPS signature, and turn them into prevent mode based on factors such as the severity of the vulnerability, the performance hit to the firewall gateway, the chance of false positives, and the relevance to our environment. This allows us to easily maintain up-to-date network protection with a lower chance of unexpected business interruption.
What is most valuable?
The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.
It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security.
Also, you can easily search through thousands of IPS signatures using various keywords is another feature worth noting.
What needs improvement?
Out of the box, the number of built-in reporting and dashboards related to the IPS logs and events has room for improvement. The dashboard reports can be easier to generate and customize.
It would also be nice if the system would allow some form of alerting when specific signatures have been triggered X number of times within Y amount of time. This would allow us to be better notified when there is a security attack going on, without too much of false-positive alerts.
Another would-be-nice request is to have more details information about how the signatures would detect the specific security vulnerability. This allows us to make a judgment about how useful a particular signature is in our specific environment.
For how long have I used the solution?
I've used the product for over ten years.
What do I think about the stability of the solution?
The stability should be high as we don't have many issues with the IPS solution. In the last couple of years; we only had one issue due to a bad signature.
What do I think about the scalability of the solution?
We have not observed any major performance hit to the firewall gateway by enabling the IPS module. Of course, some signatures did indicate a high-performance hit to the gateway, in which we typically won't turn on those signatures unless there is a strong need.
How are customer service and support?
Good technical support is by chance/luck. Sometimes you run into good tech support. Other times you may run into someone that doesn't know much more than yourself.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We also have extensive experience with the Cisco Firepower solution. We actually use both solutions in our environment.
How was the initial setup?
The initial setup is pretty simple so long you just follow the default steps, without too much worry about going through the thousands of signatures manually.
What about the implementation team?
We did a self-install.
What's my experience with pricing, setup cost, and licensing?
With Check Point, the IPS license could be bundled with the firewall product and so the license cost is not huge.
It does take time to get familiar with the UI and understand the "workflow" that Check Point has in mind when designing the solution. A good understanding of this would allow an easier adoption.
Which other solutions did I evaluate?
We use both Check Point's and Firepower's solutions in our data center.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Support at a security firm with 51-200 employees
Keeps our network safe without slowing us down
Pros and Cons
- "Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security."
- "Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details."
What is our primary use case?
We first saw that this blade was available to use in our Check Point gateway. Later, we understood that there are advanced threats that are in charge of exposing weaknesses. We did not have our perimeter completely covered, which is why we decided to use this technology.
This technology helps us to detect and prevent attempts at exploiting vulnerabilities. It also helps a lot as the tool poses very few false positives, giving the tool good credibility.
How has it helped my organization?
Check Point IPS has helped us to have greater perimeter security through our Check Point Gateway. It offers us an easy implementation and has great protection across our infrastructure.
By means of Smart Events, we can carry out very advanced monitoring of the threats that have tried to enter our infrastructure.
It is a great tool. It is totally recommended by us. It really covers many areas of security, such as anti-malware, data loss, improper use of protocols, and preventing known exploits.
What is most valuable?
One of the characteristics that we liked the most is the functionality and easy implementation via the Check Point Gateway.
The cost is reduced to being a blade. That is a good detail of the product in terms of licensing.
Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.
Also, a very good feature is the optional mode of putting it only in detection mode. They are ensuring in that sense that they are not so intrusive at the beginning of the implementation in production environments.
What needs improvement?
Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details. In addition to extending some implementations, it would be good for Check Point to keep its documentation public and updated.
This product, as a blade, does not include the license with the Check Point gateway.
Some errors are generated in the implementation of the Smart Cloud in the Infinity Check Point Portal. When that happens, cases of withdrawal must be carried out without embargo for a long time in response.
For how long have I used the solution?
We have been using this solution for about two years and have received the expected results. We are satisfied with the product.
What do I think about the stability of the solution?
Yes
What do I think about the scalability of the solution?
Yes
How are customer service and support?
Great and easy.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we did not use another brand or tool. This is our primary solution now.
What about the implementation team?
No
Which other solutions did I evaluate?
We did evaluate other options. It is always important to evaluate various options to see how they adapt to the client's system and infrastructure.
What other advice do I have?
We recommend the product. It is highly safe and easy to use.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 30, 2025
Flag as inappropriateTelecommunication Team Leader at a financial services firm with 201-500 employees
Provides new versions of IPS policies and indicators of compromise, which help us maintain an up-to-date security posture
Pros and Cons
- "The integration of IPS with the firewall is quite efficient."
- "A reduction in price would always be welcome."
What is our primary use case?
I primarily use Check Point IPS as the second layer of security. The first layer includes routers, DDoS protectors, and access lists on other network devices. Check Point IPS is used for threat prevention in the network, not for web applications. I also rely on other solutions for web application firewalls.
What is most valuable?
The integration of IPS with the firewall is quite efficient. It's easy to implement, monitor, and prevent certain situations on the same platform, which is very useful for me. Also, the real-time update function is beneficial. Check Point provides new versions of IPS policies and indicators of compromise, which help us maintain an up-to-date security posture.
What needs improvement?
Currently, the solution is good for my needs, so I don't have any particular improvements to recommend. However, a reduction in price would always be welcome.
For how long have I used the solution?
I have been using Check Point IPS for over ten years.
What do I think about the stability of the solution?
The stability of the solution is very high. I would rate it as ten out of ten. It has been consistently reliable.
What do I think about the scalability of the solution?
Scalability can depend on the environment. In my setup, using a hardware version, scaling is not easy. There's a limitation on the power because it's not a modular harmonic system. Others might find it easier to scale if they use the Harmony solution.
How are customer service and support?
Customer support used to be very good, rating at nine or ten out of ten a few years ago. Recently, it's not as strong, more around six or seven out of ten due to the quality of solutions provided and support handling of cases.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used many platforms for Check Point, including Nokia and Splat, and now I use a dedicated platform for Check Point IPS.
How was the initial setup?
The initial setup was simple, though it was a long time ago.
What's my experience with pricing, setup cost, and licensing?
The price could be lower. It's always better for an end user when prices are reduced. The cost makes it difficult to implement in smaller companies.
Which other solutions did I evaluate?
I have used many vendors and platforms, such as Nokia and Splat along with Check Point, for various security needs.
What other advice do I have?
Overall, I rate Check Point IPS a nine out of ten. I recommend it to other users for its integration capabilities and stability.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Student at a university with 5,001-10,000 employees
Effortless configuration with deep packet visibility across layers
Pros and Cons
- "Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations."
- "From the product perspective, there have been instances where the signature download caused issues."
What is our primary use case?
Initially, the requirement was just to have a stateful inspection firewall to control traffic entering our network. Later, we needed deep packet inspection to look into packets deeply to identify any kind of malicious content. This led us to start using Check Point IPS to have visibility across all the seven layers of traffic entering the network.
How has it helped my organization?
The solution is consumed by our SOC to ensure we have visibility into traffic entering our network. With IPS's logs, we began to get a lot of visibility into the type of traffic flowing into our network. It fulfills our SOC's need and has become our standard for deep packet inspection, which is easy to deploy.
What is most valuable?
Check Point IPS is very easy to configure. It's part of Check Point's blade architecture, where firewall, VPN, and IPS configurations are identical, making the learning curve minimal. The feature can be enabled with a straightforward process, allowing default or customized configurations.
What needs improvement?
From the product perspective, there have been instances where the signature download caused issues. However, it happened only once, and some QA is needed on signatures. Overall, the product is robust.
For how long have I used the solution?
I have had experience with Check Point IPS for ten years now.
What do I think about the stability of the solution?
The stability of the solution is excellent. There haven't been any issues after enabling certain features, and it hasn't caused outages in traffic. During certification, we considered exceptions to avoid IPS inspection for legit traffic.
What do I think about the scalability of the solution?
Scalability depends on hardware platform certification. Check Point's Maestro solution allows up to thirty-four firewalls in a load-sharing configuration. Properly sizing the appliance for IPS makes it a scalable solution.
How are customer service and support?
Customer service is a significant drawback. Support is challenging during weekends, and support personnel often require unnecessary details, slowing resolution processes.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We use both Check Point and Palo Alto. Palo Alto is more expensive, with a front-end focused design lacking on the CLI. Check Point provides flexibility with Linux commands, reducing deployment hassle.
How was the initial setup?
Setup is straightforward, rated as ten on a scale of one to ten. Configuration involves enabling the IPS feature and publishing changes, identical to setting up a firewall.
What about the implementation team?
Three engineering team members worked on solution certification. The operations team, supported by four to five people, ensured deployment across global firewalls during limited change windows.
What was our ROI?
The solution fulfills the SOC's need for visibility and easy deployment of deep packet inspection, with no operational impact reported.
What's my experience with pricing, setup cost, and licensing?
As a global customer, we receive decent discounts and expand our infrastructure using the solution. There have been no pricing issues.
Which other solutions did I evaluate?
We also evaluated Palo Alto and previously worked with Juniper long ago. Palo Alto has a steeper learning curve with proprietary terms not aligned with industry standards. Check Point follows standard conventions, simplifying deployment.
What other advice do I have?
Check Point IPS is a preferable solution for its price, stability, and deployment ease compared to more complex solutions.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a security firm with 51-200 employees
Easy to implement with helpful support and good ROI
Pros and Cons
- "Check Point IPS manages risk categories very well and accordingly helps us protect each of our devices in real-time."
- "When entering, it always takes a long time to load."
What is our primary use case?
Check Point IPS was implemented two years ago to protect our infrastructure from threats.
It began by being implemented in local environments with a reduced staff to carry out the corresponding tests and not cause a total company blockage. Once the tests were over, we gradually extended to different departments. We began to use Check Point IPS to be able to provide security of Internet to users using the IPS and anti-virus anti-bot modules, we also apply them to invite us to enter the company and thus monitor outgoing Internet traffic and thus avoid malicious users. Prevention and detection are one of the most valuable pillars of security.
How has it helped my organization?
This tool has allowed us to obtain complete reports of the applications' vulnerabilities, which helps us remedy these vulnerabilities presented by the organization.
It helped us a lot to monitor the internal traffic keeping monitored each server or user that enters the platform in this way Check Point IPS. It has allowed us to proactively reduce any incorrect configuration of network access that results from delegation.
One of the points where Check Point needs to improve is in the support they offer, since there we have had a few inconveniences.
What is most valuable?
The implementation of Check Point IPS brought a lot of value to our organization with all the characteristics that the tool shows, starting with great visibility in a single dashboard, which makes it much better. You don't have to go through different tabs.
Another feature is that it allows you to create multiple rule profiles. We can block directly from the outside without waiting to look at the logs.
With these and other features, Check Point IPS manages risk categories very well and accordingly helps us protect each of our devices in real-time.
What needs improvement?
It is always important to be improving the product to be at the forefront of technology.
One of the improvements that would be good is to improve the latency in the portal. When entering, it always takes a long time to load. Also, when the tool is already running, you feel a slight decrease in performance.
The application has many facilities when using the tool. The configuration of each of the policies should have filters.
We need to be able to understand and detect each of the vulnerabilities.
For how long have I used the solution?
This solution has been used for approximately two year in the company.
What do I think about the stability of the solution?
It's very stable. We never had any issues of it stopping to work. It's been very stable.
What do I think about the scalability of the solution?
We have not observed any significant performance impact on the firewall gateway by enabling the IPS module.
How are customer service and support?
The Check Point engineer we dealt with during setup had a lot of experience. His working knowledge helped us with the implementation.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
It is the first time that we've implemented a tool of this type.
How was the initial setup?
We implemented the product in-house with the aid of support as part of a POC.
A Check Point engineer who had a lot of experience helped us with the implementation.
What about the implementation team?
We implement the product internally with the help of support.
What was our ROI?
Attacks are prevented and detected based on severity, helping our organization eliminate compromising attacks. When making an investment with these tools, you are taking care of an important aspect that will double your profits.
What's my experience with pricing, setup cost, and licensing?
With Check Point, the IPS license could be included with the firewall product. Therefore the cost of the license is not huge.
Which other solutions did I evaluate?
Other solutions were not evaluated. We have always worked with Check Point products.
What other advice do I have?
One piece of advice is to have the latest database. You want to be protected against the latest attacks.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Fortinet FortiGate
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Trend Micro TippingPoint Threat Protection System
Palo Alto Networks Advanced Threat Prevention
Cisco IOS Security
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Palo Alto Networks URL Filtering with PAN-DB
Zscaler Cloud IPS
NSFOCUS NGIPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?














