What is our primary use case?
It's used for a small business network which needed additional protection and threat prevention, remote work capabilities, and excellent support. It's capable of handling multiple public IPs and directing traffic to the appropriate interfaces. The solution can handle multiple ISPs for backup or aggregation of traffic.
The environment consists of eight PCs and six other devices which need Internet access and which must be protected. The ability to restrict traffic to specific network addresses as well as the ability to block malicious hosts trying to get into the network has been great.
How has it helped my organization?
Check Point's Next Generation Firewall solution was perfect for reviewing logs, providing an initial layer of anti-virus/malware protection, and providing the support, when needed, to ensure that the product remained up-to-date.
The ease of searching through the logs for specific incidents is outstanding and very easy to understand. In addition, the categories for web content blocking have been helpful for setting base traffic standards, can block P2P networks, social media, and content not suitable for business.
What is most valuable?
The protection has been outstanding! I have not had an infected machine behind the firewall since I first installed and started using NGFW. I appreciate the network health reports, the infected devices report, they make my job a lot easier by providing the information right there in the interface.
With the web category blocking turned on, I can set it and forget it so that inappropriate business content is not brought into my network, it makes it easier to ensure that time isn't being wasted on non-business-related activities.
What needs improvement?
I really want to see geo-blocking as a feature of NGFW. Way too many hacking attempts from other countries are coming from where we don't travel. In addition, would like to see the VPN use MFA easily, just as another layer of protection.
Another area of improvement would be a click to block when there are attempted hacks. While the infected device blocking is a good start, you should block traffic from the originator of the traffic; it would be great to be able to do that with any traffic.
Also, it would be helpful to set thresholds on attempts and then autoblock that traffic for X amount of time, or permanently.
For how long have I used the solution?
I've used the solution for six years.
What do I think about the stability of the solution?
I have not had any issues with the device for the past six years; it has just worked. By that I mean that unlike some cheaper firewalls (consumer grade), the Checkpoint NGFW is enterprise grade, I never had to reboot the firewall to get traffic working again, I would just leave it up and running until a firmware upgrade was available and after the upgrade, the firewall would automatically reboot, but aside from those times, firewall was on 24/7.
What do I think about the scalability of the solution?
The solution is very scalable. There are a lot of different types of devices to choose from.
How are customer service and support?
Anytime I needed support, they've worked with me until the issue has been resolved. I'd give them an A+.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We used Watchguard, however, we needed better protection and also wanted to try out Check Point NGFW as I'd heard good things about it.
How was the initial setup?
The initial setup was straightforward. I just needed to figure out how to migrate policies (recreate them) from a different vendor to Check Point. It was relatively easy to figure out and there has extensive documentation available.
What about the implementation team?
We handled the initial setup in-house
What was our ROI?
Peace of mind is my real ROI.
What's my experience with pricing, setup cost, and licensing?
The pricing is a little on the high side, however, the protection afforded is worth it.
Which other solutions did I evaluate?
I did not evaluate other solutions. I previously utilized devices from Sonicwall and Watchguard.
What other advice do I have?
Do your research and size the appliance correctly.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. I am a user, but I am also a reseller of the products.