What is our primary use case?
We use Check Point on a daily basis. It is our primary gateway to the internet, with an extensive rule base that's used to block unwanted connections and protect our internal networks.
Multiple gateways are used in a VPN community to build a secure homogenous company network over the Internet.
We also use the two-factor authentication with RSA-Tokens to authenticate users that are away at conferences or in the home office to the firewall.
RSA is also used on a portal (called mobile access) on the gateway, where users can easily check their e-mails and access company resources.
How has it helped my organization?
Check Point NGFW has proven to be a reliable firewall. We have been using it for over 15 years now.
It's offering great security while also being rather easy to manage.
We evaluated a couple of other firewall solutions over the years, yet always came back for Check Point for a couple of reasons. First, they are the market leader and there are just very many resources online for installing, configuring, debugging, and so on. Second, other firewall solutions may initially be cheaper (especially for basic firewalling), but when you need more features Check Point has a surprisingly good price point.
What is most valuable?
I personally like the SmartDashboard client best, which is the rule base management solution. You have a nice overview of the existing rules, and new rules are easily implemented. You can filter by IP, application, rule number, port, or hostname, so you easily find what you are looking for. Rules can be grouped by topic (internal, external, Internet, DMZ, etc.). It all can be well arranged to suit your needs.
It also offers a dashboard to see recent threats, errors, or other issues with your gateways, as well as Logs for debugging.
What needs improvement?
Unfortunately, as is the case with many big companies, new features seem to always be more important than fixing the last little bugs that affect only a minor customer base.
The command line, for instance, is still needed regularly if you want to dive deeper into debugging certain issues.
While it certainly has improved over the years, it still doesn't feel like a polished product. Some features (e.g. super netting VPN connections) need to be enabled by editing a configuration file, which is sometimes lost upon upgrading to a new version. I'd really like to see more easily manageable debugging solutions.
For how long have I used the solution?
I've used the solution for 15 years.
What do I think about the stability of the solution?
We did have stability issues by using a not officially supported Check Point setup, running it in a virtualization environment, so the Firewall gateway was running on a Xen cluster. In the beginning this was running fine, buter after a couple of months the Checkpoint services kept freezing and needed to be restarted manually. As this started to occur more regularly (a couple of times per week) we migrated the firewall to dedicated hardware.
So I'd recommend always using supported setups.
What do I think about the scalability of the solution?
The biggest enterprises in the world use Check Point products. Scalability is not an issue.
Which solution did I use previously and why did I switch?
We used Microsoft ISA Server, which is a discontinued product before Check Point.
What's my experience with pricing, setup cost, and licensing?
Check Point has a pretty competitive price point if you use the features it has to offer. If you need only basic firewalling other solutions may be better suited to your needs.
Which other solutions did I evaluate?
We evaluated Palo Alto, Fortinet, and Barracuda.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.