The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.
Senior Security Analyst at SecurView Systems Pvt Ltd
Security management improves with enhanced threat prevention strategies
Pros and Cons
- "Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management."
- "Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture."
What is our primary use case?
How has it helped my organization?
Check Point NGFW has positively impacted my organization because, as a security provider, we have business from multiple nations worldwide, but certain nations where we do not have any business relevancy require traffic blocking.
Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management. These features have helped us manage and strengthen our security posture.
We have observed improved network visibility and control with detailed reporting and logging after implementing Check Point NGFW, along with a stronger compliance posture and reduction in incidents.
What is most valuable?
In my experience, Check Point NGFW offers excellent region-wise blocking capabilities, which proved particularly valuable during recent tension between India and Pakistan border crossing issues.
The IPS, anti-bot, threat emulation, and URL filtering features are working exceptionally well from a prevention perspective.
What needs improvement?
Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture. Licensing can be confusing and expensive, so segregating it into a simple format would be helpful.
Software updates and hot fixes require compatibility checks to avoid disrupting the production environment.
Buyer's Guide
Check Point NGFW
June 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point NGFW for almost a year and a half.
How was the initial setup?
My experience with pricing, setup costs, and licensing for Check Point NGFW has been straightforward, as everything is better and convenient to use.
What other advice do I have?
I work in Secure System Private Limited as a security analyst for the last six years. I can share specific outcomes and metrics I have seen since using Check Point NGFW.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 19, 2025
Flag as inappropriate
Network Security Engineer at Digitaltrack
Helps prevents phishing, ransomware, and zero-day attacks
Pros and Cons
- "The thing I like about this product is its capability of auto NAT and auto zone detection."
- "Service support can be improved."
What is our primary use case?
The primary use case of this solution is to protect the organization's LAN network from cyber threats.
How has it helped my organization?
With the help of Check Point NGFW, we are able to prevent attacks like phishing, ransomware, zero-day attacks, malware, etc.
What is most valuable?
The thing I like about this product is its capability of auto NAT and auto zone detection.
What needs improvement?
Service support can be improved.
For how long have I used the solution?
I've been using the solution for the last year.
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Customer service and support can be improved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
No, I did not use a different solution.
How was the initial setup?
The initial setup is easy.
What about the implementation team?
We implemented it through our in-house team.
What's my experience with pricing, setup cost, and licensing?
For the current market situation setup cost, pricing, and licensing look fine.
Which other solutions did I evaluate?
No, I did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point NGFW
June 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Manager - IT at NVCL Group
By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization
Pros and Cons
- "It enhanced our organization's security posture compared to our previous solution."
What is our primary use case?
The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies.
How has it helped my organization?
It enhanced our organization's security posture compared to our previous solution. It offers superior protection with advanced threat management capabilities, including robust firewall defenses, intrusion prevention, and real-time anti-virus and anti-malware protection.
This has markedly reduced our vulnerability to cyber threats. Additionally, the appliance's content filtering and application control features have enabled us to manage bandwidth more efficiently, prioritizing critical business applications and preventing unnecessary traffic. This optimization has not only improved network performance but also reduced operational costs by eliminating bandwidth wastage.
What is most valuable?
The WatchTower feature is particularly valuable, providing real-time monitoring of incidents, which enhances our ability to promptly address and mitigate security threats, ultimately leading to reduced overheads and improved overall efficiency.
The WatchTower app is accessible from mobile devices, providing administrators with the flexibility to monitor and manage security on the go. This mobility ensures that security management is not confined to the office, allowing for rapid response even when off-site.
What needs improvement?
They should improve integration with third-party security tools and software for a more unified security ecosystem.
They should enhance compatibility with various network environments and cloud platforms can be valuable. Offer more comprehensive support options, including extended hours and more accessible resources.
They should provide more extensive training materials and documentation to help users maximize the appliance's capabilities. Integrate user awareness and training modules within the appliance to educate employees on security best practices.
For how long have I used the solution?
We have been using it for more than two years.
What do I think about the stability of the solution?
Stability is exceptionally positive. Since its implementation, the appliance has demonstrated remarkable reliability and uptime, consistently maintaining our network's security without disruptions
What do I think about the scalability of the solution?
It provides a robust and scalable solution that meets both our current requirements and future growth plans.
How are customer service and support?
Customer service is overall good, but we would like it to be more enchnaced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used a different security solution but we switched it because of a phishing attack. Though we had a solution, it had not done its job perfectly.
How was the initial setup?
The setup is straightforward.
What about the implementation team?
We implemented it through a vendor. I would rate it an eight out of ten.
What was our ROI?
It helped us reduce operational costs associated with network security. By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization.
What's my experience with pricing, setup cost, and licensing?
Setup cost is not much, hence pricing and licensing need to be considered. If pricing gets lower that would be great.
Which other solutions did I evaluate?
We previously used a different security solution but switched to the Quantum Spark Security Appliance 1570 due to several issues with the old system. Our previous solution lacked advanced threat management features like real-time anti-virus and anti-malware protection, and had ineffective bandwidth management leading to network performance bottlenecks.
What other advice do I have?
This is a best solution for us so far and we recommend this to anyone.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Information Security Officer at a consultancy with 1-10 employees
Safeguards networks against a wide range of cyber threats with its robust security features, advanced threat prevention and centralized management
Pros and Cons
- "Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness."
- "Scalability should be improved."
What is our primary use case?
It can function as either a standalone appliance or as part of a clustered solution, offering flexibility to suit the needs of various customers, ranging from small businesses to large enterprises. We have experience working with a diverse clientele across different industries, leveraging Check Point's solutions to provide comprehensive network security tailored to each organization's requirements.
What is most valuable?
Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness.
What needs improvement?
Managing a smaller number of firewalls is straightforward, but as the scale increases, especially with numerous firewall instances, the complexity grows significantly. Scalability should be improved.
For how long have I used the solution?
I have been working with it for twenty years.
What do I think about the stability of the solution?
It offers good stability capabilities.
What do I think about the scalability of the solution?
We've encountered challenges related to scalability, particularly with its performance slowing down as the volume of objects in the network grows.
How are customer service and support?
While most engineers are typically responsive, there may be variations in their availability and response times. I would rate its customer service and support eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I also work with Fortinet, and I find it preferable because it offers a wider range of options. Additionally, its integrated package functions exceptionally well, with seamless coordination between services.
How was the initial setup?
The initial setup process is typically straightforward for most customers. However, when comparing Check Point with other solutions like FortiGate, there's a notable difference in how policy rules are implemented. With Check Point, you need to install the entire policy each time you want to make changes, whereas FortiGate allows for more streamlined updates by simply accepting the modifications. This can sometimes add complexity to installing a new policy with Check Point.
What about the implementation team?
The deployment time varies depending on the scale of the project. For small cases, it may only take a couple of minutes, while larger-scale deployments can span up to a month. Having a skilled engineer is crucial; one proficient engineer can handle the job effectively. Maintenance is relatively straightforward.
What's my experience with pricing, setup cost, and licensing?
While it may be slightly more expensive, when compared with competition it is reasonable. Licenses are renewed annually.
What other advice do I have?
Overall, I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Consultant
Consultant at ITQS
Helps prevent attacks, good central management, and improves visibility
Pros and Cons
- "One of the valuable characteristics of Check Point NGFW is that it presents very centralized management."
- "Support cases have been generated several times, and it takes time for the case to be resolved."
What is our primary use case?
We brought all of our cloud platforms to Microsoft Azure. We needed a tool that would give us the security of regulating access control so that we could monitor our environment in case something was penetrating our internal network.
This was the primary movement for which the Check Point NGFW tool was acquired since we needed our collaborators to have secure access to the company's resources and applications since this tool provides us with the alerts and corrections that must be made when finding a security breach in our environment.
Check Point NGFW also provides a great capacity of features that help us apply them to the organization. It has web filtering limited to third parties, SSL encryption, and the application's administration is very simple and centralized since it helps us a lot in reporting and generating alerts.
How has it helped my organization?
The organization needed a tool that would provide various security functionalities in the organization, and so far, Check Point NGFW has helped us a lot. It has helped us by applying access control policies and limiting access to third parties and only those who must enter the organization to use resources and applications.
The application behaved very well with the Azure resources in the cloud; it helped us to prevent several security holes found with web filtering and internal DDoS attack.
Check Point NGFW can quickly identify where the attacks are coming from, provides detailed and complete information on the attacks, and provides zero-day attacks in real-time.
What is most valuable?
One of the valuable characteristics of Check Point NGFW is that it presents very centralized management. Due to this, it's improved our security throughout the organization and outside of it. Many collaborators work from their homes or different places and help us filter, limit of access to packet inspection with flexibility and speed that was not previously possible.
Other characteristics are the records that it shows us and generates depending on its configuration and they are very visible to be able to attack and correct in time, or when superiors ask us for administrative information in that part it provides great value.
What needs improvement?
As such, the tool provides what is expected in its security functionality. However, some points must be improved, such as the latency in the GUI entry. It takes a while to register and allow access to the administrative panel.
Another point where customer service should be improved, both in the administrative and technical fields. Support cases have been generated several times, and it takes time for the case to be resolved. In addition to that, the solutions need to attend to us. It takes a long time to coordinate a call since they do not handle a comprehensive schedule.
For how long have I used the solution?
This solution has been used for approximately one year in the company.
What do I think about the stability of the solution?
The stability of the tool is good. We have not presented any problem even when an update is made.
What do I think about the scalability of the solution?
The scalability presented by the tool is very good and flexible.
How are customer service and support?
The experience has not been very good. That is one of the points that must be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no type of tool that would supply these qualities.
How was the initial setup?
The configuration of the tool is very simple and quick to install.
What about the implementation team?
The installation was done jointly with an engineer provided by the supplier, and his capacity was good.
What was our ROI?
The prices are competitive. However, it is worth making an investment since, in the future, the profit will be seen against any environmental attack.
What's my experience with pricing, setup cost, and licensing?
Check Point manages a good cost in its products and it is worth making the investment since this can prevent a collapse in the organization.
Which other solutions did I evaluate?
Check Point was always our first option. With this type of solution, many security teams are from Check Point.
What other advice do I have?
The tool behaves well. The only improvement that I have seen that is necessary is to improve the latency when entering the application and they must improve the support.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at sep2
Good application control/URL filtering with helpful support
Pros and Cons
- "The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network."
- "One feature that could be improved is the internet object in the application control/URL filtering blade."
What is our primary use case?
My primary use case of Check Point's firewalls is to provide in-depth network filtering with advanced threat prevention, which can be set up simply using autonomous threat prevention where the firewall learns about the environment and then actions threat prevention based upon that. The threat prevention can also be custom-built for your environment.
I also use the Check Point Always On VPN for remote endpoints, which allows users to authenticate and connect to the VPN pre-login without any input from the users.
How has it helped my organization?
It has improved my organization due to the in-depth security it provides. Check Point has a lot of security-focused features that provide a great level of network security. It has improved the security posture of the organization due to the granularity that can be set in the policies, such as using access roles to set user-based access, and time-based rules to only apply a specific firewall rule at a specific time. It has also improved my organization because of the in-depth troubleshooting steps that are made available to the end user, meaning we can troubleshoot issues easily, and troubleshooting steps can get very advanced.
What is most valuable?
I have found the VPN and the application control/URL filtering the most valuable features. The main reason for this is that the VPN blade allows easy VPN setup between two VPN gateways, allowing for not only site-to-site VPNs but also for remote users to connect to the Check Point gateways. This feature is easy to set up. Also, users can troubleshoot the VPNs very in-depth.
The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network. Instead of just allowing certain Layer 4 ports in/out of the network, specific applications can be allowed, which not only can tighten a security posture. It makes administering the product easier as, when a new app is rolled out, it can simply be added to the policy.
What needs improvement?
One feature that could be improved is the internet object in the application control/URL filtering blade. In most deployments, this works as it says it will. However, the object is based on topology, not internet IP ranges. This means that in certain scenarios (and likely a non-standard deployment), the internet object can not refer to the internet. This can be bypassed by creating a networking group containing class A, B & C networks and using this in the policy, right-clicking the group and ticking 'negate.'
Another improvement would be to improve the simplicity of deploying SAML as an authentication option when connecting using a remote access VPN. Check Point's deployment guide is very in-depth. However, the process could be simpler.
For how long have I used the solution?
I've used the solution for three years.
What do I think about the stability of the solution?
The stability is very good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Support is very good from Check Point.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be straightforward or complex depending on the complexity of the environment. Usually, it is fairly straightforward.
What about the implementation team?
We implemented the solution in-house.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. I provide Check Point support, as well as use these firewalls.
Network Engineer at a tech vendor with 201-500 employees
Good remote access, reporting, and firewall rules
Pros and Cons
- "With the outstanding capabilities of Check Point, we managed to have stable site-to-site VPNs with all our partners and with every other vendor's devices."
- "SmartEvent Settings and Policy GUI, and the rest of external apps should be improved."
What is our primary use case?
My company had the need to replace the existing firewall cluster of our data center, due to the end of support and end of life of the model. The choice of our next firewall depended on the following:
1) Ease of use
2) Ease of deployment
3)Centralized Management
4) Remote Access VPN Support
5) Strong Forums and Community
6) Strong Technical Support in case of any failure
7) Training of administrators via vendor certifications
8) Reporting capabilities for capacity planning
We have many site-to-site VPNs with our partners; they access our platform via site-to-site VPNs, remote access VPNs, and the internet.
How has it helped my organization?
With the outstanding capabilities of Check Point, we managed to have stable site-to-site VPNs with all our partners and with every other vendor's devices. The remote access capabilities and features are considered very strong, since the settings are excessive, and focused on each customer's need.
The IPS engine and all threat prevention features are considered stable. Central management of every firewall spread all over the world is achieved by setting up an SMS server, which makes our lives easier.
What is most valuable?
SMS server is considered very valuable, as Central management of every firewall spread all over the world is achieved by setting it up.
Remote Access VPN is used by our company for work-from-home purposes of our employees and for partners that need to access our resources.
Reporting of network interface traffic is very valuable since capacity planning for the next quarter or year takes place, and provides us with valid data.
Firewall access rules contain the negative choice.
IPS engine protects our infrastructure from malicious events.
NAT counters, ACL Counters.
What needs improvement?
Monitoring of the site-to-site VPNs and administration of the site-to-site VPNs (bring tunnel down, bring tunnel up) should be improved, as this will make the troubleshooting process easier, if something goes wrong, in order to understand which side has the issue.
As a company, we have the need to pass traffic from one site to site VPN to another, and this is not achieved directly via ACL policies; we need to create another VS environment in order to achieve it.
SmartEvent Settings and Policy GUI, and the rest of external apps should be improved.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Specialist at Tech Mahindra
Customizable with good filtering and fair pricing
Pros and Cons
- "It offers services like navigation, control, and filtering, which ensure that all users stay connected to business applications."
- "They need to offer quicker resolution and maintenance during downtime."
What is our primary use case?
Check Point Next Generation Firewall is one of the most secure and stable firewalls present in the market. the integration & implementation of Check Point Next Generation firewall took place due to security concerns, and we were impressed by what this product brings with it.
The integration of Check Point Next Generation Firewall in my organization has taken over one year or so, and it helps to segregate the internal network and build a secure VLAN that separates every department.
Scalability, end-to-end resolution, and customized productive services make Check Point Next Generation Firewall far better than the alternatives present in the market. It has services like navigation, control, and filtering that ensure that all users stay connected to business applications and helps restrict traffic.
How has it helped my organization?
The integration of Check Point Next Generation Firewall proved to be highly productive and scalable, and everything was offered at a lower price.
Check Point Next Generation Firewall helped out us drive innovation and growth in our organization. It provided a safe passage for system and data security via its services of navigation, control, and filtering. The product ensures that all users stay connected to business applications and helps restrict traffic.
Overall, the Check Point Next Generation Firewall protects us from all types of internal and external threats while being easy to use and set up.
What is most valuable?
The integration of the Check Point Next Generation Firewall in my organization has taken over one year. It helps to segregate the internal network and build a secure VLAN that separates every department.
We like the scalability, end-to-end resolution, and customized productive services. This makes Check Point Next Generation Firewall far better than any alternative present in the market.
It offers services like navigation, control, and filtering, which ensure that all users stay connected to business applications.
Check Point Next Generation Firewall Protects systems from all types of internal and external threats.
What needs improvement?
Check Point Next Generation Firewall requires frequent updates. They need to build a more user-friendly dashboard and have the implementation of more active VPN support.
Apart from this, Check Point Next Generation Firewall customer support service needs to be improved. They need to offer quicker resolution and maintenance during downtime.
Check Point Next Generation Firewall Protects from all types of internal and external attacks and is a must-have software for professionals and organizations.
For how long have I used the solution?
It has been more than one year since I integrated Check Point NGFW.
Which solution did I use previously and why did I switch?
I haven't been in integration with any other solution.
We decided on this solution after looking at reviews and comparing prices. Check Point proved to be the best option in the end.
What's my experience with pricing, setup cost, and licensing?
I would advise others to go for it. It's easy to set up and available at lower pricing than alternatives.
Which other solutions did I evaluate?
No, we did not evaluate other options. We just compared other alternatives from some review websites and decided to go for Check Point.
What other advice do I have?
It's a must-integrate solution for professionals and organizations.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Meraki MX
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?