We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices.
Atos provides this solution, including network design and advice.
We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices.
Atos provides this solution, including network design and advice.
In a VPN setup, we have Internet connection via Check Point. The connectivity is not turnkey like competing devices. We have not yet terminated our site-to-site VPN because things are fluctuating right now and Check Point needs to be upgraded. Also, their troubleshooting needs to be improved for this.
I have been using it for five years.
I haven't seen any stability issues, though I have seen some issues with the management of the gateway. Stability-wise, it is good (a nine out of 10).
We have 74 locations. We can have 10,000 users maximum via an Internet gateway. We have four data center across the world: two in USA, one in London, and one in Dubai. Passing through Check Point per location: in the USA - 5000 users, in London - 2000 users, and in Dubai - 10,000 users.
There are 12 network security engineers/consultants managing Check Point and the legacy firewall, SonicWall.
Right now, we cannot go directly to Check Point because of vendor dependency. We have to first initiate with our vendor.
We migrated SonicWall to Check Point about two years back. That took one year to set up in our organization.
We switched away from SonicWall because it is a legacy firewall at end of life. SonicWall was missing features that Check Point has, like UTM, IDS, IPS, antivirus, etc. Check Point is better for protection and performance-wise.
It is easy to deploy or upgrade. There is no need to do this manually with commands. This solution can be set up online.
We have two devices. Right now, we are deploying and upgrading a new setup, where you can do management, management plus gateway on the device, or virtually you can install your management device on VMware or Hyper-V. With the Hyper-V and the Management Server, you can access all the gateways. For the Management Server and gateways, we have an activation key.
We are an IBM OEM company who received installation support from that vendor. They provided all the network connectivity.
For our implementation, we:
For our strategy, we looked at:
A smaller office of less than 500 people would get a 4000 Series. Whereas, a larger office would get a 5600 or 7000 Series. We have to be focused on the natural topology.
We have had some vulnerabilities when we upgraded the R80.30 Management Server. We have some gateways right now in our R77.30 version, and this means if we go without license in R80.30, then it will prompt a bad connection and terminate. We have had some license difficulties with the connection going from R70 to R80. However, these don't largely impact performance.
We looked at Fortinet and Palo Alto. We did not feel FortiGate was capable of what we required. Palo Alto is somehow not as good as Check Point, budget-wise and performance-wise. Palo Alto is more costly than Check Point.
If you need a good support or something that is good budget-wise, then I recommend going with Check Point compared to Cisco or Palo Alto.
It is a good firewall. It has returned good performance. We are happy with the product. I would rate the product as a nine out of 10.
We primarily use the product to block traffic at the application layer, limiting access to YouTube and social media during busy periods while allowing it during lunchtime or office hours.
The product's primary benefits include effective intrusion blocking and improved network management.
I appreciate the support provided as well. It is highly reliable and has a prompt response time.
The system's operation could be enhanced. I recommend developing a management console that can more efficiently handle multiple Check Point devices, as we have multiple appliances across different sites.
We have been using Check Point NGFW since 2016 for approximately eight years.
There are occasional issues, but they are typically resolved with subsequent updates. I rate the stability a six out of ten.
We have three sites where we use Check Point NGFW. The first site has about 1000 users, the second site has between 800 and 900 users, and the third site has approximately 100 to 200 users.
I rate the product scalability as two out of ten. Improvement is needed as it could be more convergent, particularly for on-premises solutions.
We are currently using Check Point, Palo Alto, and Cisco.
Check Point's advantages include its lower cost than Palo Alto. However, it requires maintenance of many parts, as it is only partially GUI-based. In contrast, Palo Alto is mostly GUI-based, simplifying operations for our IT security team.
The setup process was straightforward. Some aspects in terms of maintenance are easier due to the GUI-based interface.
We took help from a consultant for implementation.
I recommend Check Point Firewalls. It is a solid product with reliable support and frequent updates.
I rate it an eight.
In our logistics setup, we employ Check Point NGFW across various critical areas. For instance, we use it to secure different database applications within our systems, ensuring robust protection for our operations. Whether it is managing updates, maintaining standby reliability, or enhancing system performance, Check Point NGFW plays a vital role in safeguarding our logistics infrastructure.
Using Check Point in our system has provided several benefits. Firstly, it ensures secure access for authorized users while preventing unauthorized access from public users. Secondly, it enables us to monitor application usage closely, identifying any suspicious activity such as repeated failed login attempts.
Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection.
One area for improvement in Check Point NGFW is the support process. It can be challenging to open a technical support case through the customer portal, often requiring additional steps to open the case.
I have been working with Check Point NGFW since 2015.
We have not experienced any major stability issues with Check Point NGFW.
Check Point NGFW is fairly scalable.
The technical support is decent. I would rate them as an eight out of ten.
Positive
Setting up a new Check Point NGFW is generally straightforward for us. With our experience and familiarity with the process, we can handle it without encountering any significant issues. We are used to creating simulations and implementing improvements, which facilitates the setup process, even at an intermediary level. We usually require two engineers for the deployment process, along with additional resources like network switches, PCs, and testing equipment.
The pricing for Check Point NGFW tends to be higher compared to other options in the market, especially for high-end models. In comparison with enterprise-grade firewalls like Palo Alto, Check Point is among the more expensive choices.
My recommendation for organizations considering implementing Check Point NGFW is to prioritize selecting high-end models for optimal performance and security. Check Point NGFW offers robust protection for networks and data, allowing businesses to maintain their operations with confidence. Overall, I would rate Check Point NGFW as an eight out of ten.
We use the solution for full-scale integration and end-to-end management at the organization in a distributed deployment. The deployment/installation is quite easy.
Check Point NGFW is the best in terms of comprehensive protection against network threats and security against malware and phishing attacks. It smoothly restricts these via anti-phishing algorithms.
Check Point NGFW source package covers all the bases - application control, NAT, DLP, routing, content awareness, VPN, desktop security, and much more.
It is scalable, provides end-to-end resolution and customized productive services like providing a complete solution for perimeter protection that blocks the traffic based on an IP address or on applications and content. This makes Check Point NGFW a highly promising and more or less a complete solution.
Check Point NGFW proved to be highly scalable, secure, and stable, among other alternatives to multiple firewalls present in the market.
Before we used Check Point, we faced many issues such as latency, business interruptions, etc. In a single bundle we have the all solutions we need - like application/URL filtering, and threat emulation/extraction. In one single platform, we can manage everything with no need for a separate console to check/manage the features and behaviors. It has improved the performance and has minimal latency.
The most valuable aspects include:
Security Management. In a single console, we can manage the policies. It includes all the included bundles, features, and monitoring of logs.
Packet Filtering. This is used to examine every packet of data passing through your network.
Built-in High Availability. A standard backup feature should be included if you cannot risk losing your firewall.
Bandwidth control and monitoring. It's important to control the use of the bandwidth you have available.
Policy verification/validation. Check Point provides a convenient abstraction for bundling the validation of data against an expectation suite.
They could improve by lowering prices. The source package is a bit more expensive than its competitors. We've had some downtime issues
Improvements in the time and attention given to solutions for generated cases. Licensing that is more comfortable and affordable.
Check Point NGFW Firewall requires frequent updates to build more user-friendly dashboards.
A few services of Check Point NGFW require immediate improvements, like the customer support portal and the ads management on the platform.
Sometimes the KB article does not include all the steps. There is a chance for improvement in the content of global KB articles.
I've used the solution for eight or more years.
The primary use case for this solution is to protect the devices under the firewall.
There is a customer who has many switches and routers in their network. They are only protected by an old Cisco ASA firewall. So, the customer instead finds a new vendor or service, and thus we install the Check Point Firewall.
Since the customer has many devices, it takes quite some time to move the Cisco ASA firewall rules to the Check Point policies. However, Check Point has a function to import the policies so it takes less time to do so. Still, the rules that were imported are a mess so we still need to check them one by one and fix the errors before installing them in the customer environment.
The Check Point NGFW has improved the organization by helping with multi-tasking.
The Check Point Firewall that we have is better than the previous Cisco ASA as the firewall has IPS, anti-virus, and anti-bot installed into it at the same time. The IPS is frequently updated so the rules are always new and in place. The firewall IPS and anti-virus can also get other threat intelligence from the web so that the firewall will always have good protection that is up to date.
The anti-bot is good as it can prevent the firewall from being protected from DDoS without creating any rules as it automatically blocks IPs that are sending too much information to the servers.
The features I found most valuable are the import, logging, and IPS.
The import makes it easier for us to copy the rules without starting from scratch, which will take lots of time. The next thing I find most valuable is the logging. The logging which is called Smartview can distill the logs into simple reports which makes it easier to see all the attacks and issues the firewall faces without diving deep into the logs. Lastly, the IPS is always new and up to date so the attacks that happen are always blocked.
The firewall can improved to make it more user-friendly. The firewall is somewhat not user-friendly as it has many sections and makes it complicated for a layman to understand where to put the policies and rules.
The firewall also doesn't save the policies immediately after you save them, which means you need to do one more extra step in order for the new rules or policies to take effect. During my first time handling it, I did not understand why the rules and policies I put in didn't work until I found out that you need to click the install button until it takes effect.
We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop.
Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.
Thanks to Check Point, we managed to carry out a better security implementation. By placing one in a workshop, we managed to solve issues with attacks and malware.
The solution is easy to administer thanks to its dashboards. The monitoring is really useful.
The most valuable aspects include:
The best improvements to be considered are:
This is an excellent product of the new generation, administered in the Infinity Portal. We have used the product for at least two years.
Previously, we had not carried out verifications of other devices.
I am using Check Point NGFW in an internet-facing manner thanks to the advanced features and security, like the SAM database.
If anyone wants to use the firewall as internet facing, then Check Point NGFW is the best option.
Our organization gets many attacks on our server, so we have installed Check Point firewall for internet-facing scenarios,
The SAM database and advanced blade are the most valuable aspects of the product.
The Check Point architecture and packet are very good.
We need further protection from future critical cyber attacks, as cyber-attacks are growing day by day, and every day new attack is happening in the real world.
There is a huge amount of revenue lost in the financial/banking sector due to cyber attacks, so we need to have something that can highly concentrate on future cyber attacks.
Check Point should release some new technology that no vendor has ever done before.
Check Point NGFW helps me as a network security engineer as it is easy to troubleshoot the issue and also its easy to clear all vulnerabilities in Check Point after upgrading.
I have been using this solution for five years.
The stability is good.
The scalability is good.
They are awesome. They offer a high level of support.
Positive
I have used Cisco, however, due to multiple vulnerabilities, I have switched to Check Point.
The initial setup is straightforward.
The ROI is good.
They offer good quality, therefore, the pricing doesn’t matter.
I have compared many vendors, including Sophos and Fortinet.
We use Check Point as well as Cisco. The firewall is used in order to continue filtering with VMware VMotion on different data centers.
We have several data centers that are stretched. Our Check Point firewalls are used to filter north/south traffic.
With BGP on Gaia, when one of the clusters is unreacheable, the traffic is rerouted to another cluster.
We also use VSX which is really a very good product for macrosegmentation.
The management of the firewall and advanced routing is great. It's easy to use and troubleshoot.
We need east/west Check Point firewalls in order to do micro-segmentation. A good solution for us is a solution that can be installed on différent systems (Linux, Windows K8S, bare metal, etc.) and can have centralized management.
Troubleshooting is also a big feature that will be necessary in this use case.
I've used the solution for many years.
We also looked at Ciscos ASA and Fortigate.