Try our new research platform with insights from 80,000+ expert users
Harold Suárez, MGP, PMP® - PeerSpot reviewer
Project Management and Deployment Team Leader at Sefisa
MSP
Great security features with helpful support and useful integration capabilities
Pros and Cons
  • "In addition to the different security features that Check Point security solutions have, their integration with other technologies makes the security environment a complete security type."
  • "Check Point could do better to include acceleration technologies like SD-WAN in an integrated or embedded way to provide these new features that Check Point never had and is of great importance in the market."

What is our primary use case?

We have a very robust implementation of firewalls for a central site, a contingency site, and five agencies, all connected by MPLS. In each perimeter firewall, we apply the security features of FW, IPS, AV, and AB. Additionally, we have a VPN concentrator for VPN S2S and C2S.

How has it helped my organization?

Over time, Check Point's solutions have had fewer security breaches than their competitors, which is why they remain in high categories and quadrants, as they are a very robust technology. As pioneers in information security, Check Point has been innovating year after year in information security.

Since we implemented this architecture in our client, we have not had any security breach exploited and the organization maintains communication with its different sites through MPLS and VPN to secure and encrypt the traffic that passes through said connection.

What is most valuable?

In addition to the different security features that Check Point security solutions have, their integration with other technologies makes the security environment a complete security type.

Apart from the technological and innovative solution, a point in favor of Check Point is the support provided by the manufacturer, since over time, we have not had any case that is not resolved, they have a good escalation process and highly qualified staff. 

The process of opening a case has different options that are convenient.

What needs improvement?

Check Point could do better to include acceleration technologies like SD-WAN in an integrated or embedded way to provide these new features that Check Point never had and is of great importance in the market.

Its competitors have this SD-WAN technology, if it were not for the fact that Check Point has been more stable historically, this value would weigh negatively for Check Point when choosing a solution.

If Check Point includes this feature, they will be able to cover those architectures where traffic between sites must be protected and accelerated.

Buyer's Guide
Check Point NGFW
July 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point for ten years. It is a very mature and robust technology. R81 is a very stable version and always has great security features.

How are customer service and support?

I consider that they have good support engineers at each level of escalation, according to the criticality of the issue.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I do use other technologies, however, Check Point is historically more stable for me, as they have had fewer exploitable security breaches.

What's my experience with pricing, setup cost, and licensing?

Check Point has a good cost-benefit ratio.

Which other solutions did I evaluate?

We also evaluated Fortinet, Palo Alto, and Watchguard.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1853787 - PeerSpot reviewer
Systems Engineer at HarborTech Mobility
User
Good interface, excellent GUI, and helpful integrations
Pros and Cons
  • "Making configuring numerous layers of security policies easy to use was always one of the things I liked most about their firewall solution."
  • "There is no email security."

What is our primary use case?

We've been using Check Point Firewalls for about nine years, from the early Nokia boxes to the most recent OpenServer architecture. Next year we're finally going to upgrade to an appliance directly from Check Point.

Check Point Next-Generation Firewall (NGFW) is a very good firewall. It is one of the best firewalls that I have used. I would rate Check Point Next-Generation Firewalls (NGFWs) a nine out of ten. 

Also, Check Point has a great architecture, where you can just enable the software blades and deploy a secure service. 

Overall, it provides ease of deployment and ease of use.

How has it helped my organization?

All in all, I'm delighted with their security solution. Making configuring numerous layers of security policies easy to use was always one of the things I liked most about their firewall solution. 

You have multiple security layers that build upon each other, from the traditional security policy that is IP and port-based to application security, intrusion prevention, and their latest sandblast cloud-based malware detection. Everything is easily managed through their "SmartConsole" dashboard. 

What is most valuable?

It's valuable as a next-level network security appliance for your enterprise.

It comes with advanced features like web filtering, app filtering, user-based policies to restrict web and application uses, tunneling, restricting bandwidth uses according to policy, load balancing, etc., and helps to cover almost all network security requirements.

Our IT team has installed a firewall on all of our company's workstations and laptops to keep our own data and our customer's data secure. This program runs in the background and I don't even notice it, but it keeps me secure at work.

What needs improvement?

Configuration using the command line is not that simple and user-friendly.

There is no email security.

It's a bit confusing to configure at first. An example is having to set up separate source and destination NAT rather than a simple static mapping. Some configurations require accessing multiple different sections rather than being consolidated in one area. License subscriptions are a bit confusing as well for additional features.

The CLI is not very useful.

There's no option to import bulk address objects.

The firewall default rule 0 blocks rule matches to allowed traffic, even though allow rule is written.

For how long have I used the solution?

I started using this solution in 2009.

What do I think about the stability of the solution?

I am very satisfied with this product.

What do I think about the scalability of the solution?

I have been using Check Point firewalls for a few years now and I enjoy the interface.

It also integrates great with our other security tools.

The GUI is much more user-friendly than other Firewall vendors.

Which solution did I use previously and why did I switch?

I use Check Point Next-Generation Firewalls since things are automated and updated frequently. I did not use a different solution. 

What's my experience with pricing, setup cost, and licensing?

It's not the cheapest solution, however, it's one of the most advanced and competent.

Which other solutions did I evaluate?

I am not responsible for our manager's choice of this product. He said it's the best product to secure our network. 

What other advice do I have?

Check Point licenses work very differently compared to other vendors. We need to purchase each blade in order to make it work, however, we can easily obtain a trial (evaluation) license from Check Point to get visibility for the blade. Check Point tries to maintain relationships with customers and they try to match their price with customer expectations.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point NGFW
July 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Offers a secure environment with great protection and simple upgrade capabilities
Pros and Cons
  • "We can also run policies with two or more people simultaneously without problems or the risk of developing the wrong policy."
  • "The smart console is heavy."

What is our primary use case?

We currently use Check Point's firewall for our data center. We use Check Point firewall for providing the first layer of security to web application servers and intranet servers. It is robust and easy to upgrade, which makes it less stressful for the administrators. Its failover clustering option also works seamlessly.

The Check Point firewall is used to secure our environments. It also allows us to set up tunnels between our various sites.

We use it for the publication of services, as well as a notification system that reports on user behavior and unusual traffic - both within and outside of the network. 

How has it helped my organization?

Over the years, we have experienced various types of attacks on our company, and, without the help of the Next Generation CheckPoint Firewall, we would have lost.

The spoofing feature helps us to prevent various attacks in our organization.

The firewall policy designing and implementation allow for inline policies that make for clearer teaching on the correct use of policies as well as a more readable list. We can also run policies with two or more people simultaneously without problems or the risk of developing the wrong policy.

What is most valuable?

The initial sizing is not a problem. You can easily add more resources if needed. Reliability is a major factor in any hardware or software solution, and Check Point uses cutting-edge hardware. Their software upgrade process is flexible for different deployment requirements. 

Their threat analysis reporting in their management console is comprehensive and easy to use. The web-based dashboard is well designed and offers a wide variety of out-of-the-box reporting. It offers admins extensive customization.

What needs improvement?

The list of site-to-site VPN configuration options is long. They can become confusing and communication with other vendors when deploying VPNs is not the strongest. It's totally different from any other VPN vendor I've encountered.

It lists the current threats identified on the appliance's front page. It would be easier to find information by clicking on the threat and clicking the exact logs, rather than all host logs.

The smart console is heavy. It would be better if it was like the web-based consoles that Palo Alto and Fortigate FW offer.

For how long have I used the solution?

I've been using the solution for more than a year.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1830165 - PeerSpot reviewer
Technology at Partswerx
User
Very easy to use, setup and configure
Pros and Cons
  • "The small business hardware device was powerful and easy to set up."
  • "Including some sort of menu or grouping for VOIP would help the small business area that has limited support."

What is our primary use case?

We initially started using the Check Point device for the VPN blade.  

After using the VPN blade for several months and using the hardware interface we found it very easy to use.  

The small business hardware device was powerful and easy to set up. We started using the firewall and Nat shortly after that. 

Having additional features like the threat prevention that has IPS antivirus antibot and threat emulation we're all added bonuses. This also gives us a piece of mind for the safety of our business.  

How has it helped my organization?

Securing our organization was our main goal. Check Point, with threat prevention which includes IPS antivirus antibot and threat emulation has better secured our business from the internet.  

With the auto-updates made simple and knowledgeable support personnel, it has freed up our time to focus on other IT strategies.  

Utilizing the Check Point support team has allowed us to configure and use other money-saving features like VPN tunneling to remote offices, while still remaining secure in our systems.

What is most valuable?

Check Point VPN has been most valuable to our organization. Having a hardware solution that allows our remote users to connect securely to our business is extremely valuable. 

The ease of use, setup and configuration backed by the knowledgeable support of Check Point has made this a smooth and easy setup. Our users can get connected securely, anywhere. When connected with our Check Point VPN endpoint, users get the same security and prevention from the threat prevention module as the rest of the devices on our network.

What needs improvement?

As a small business, IT expenditures are always a tough call and hard sell. With every business connected to the internet these days, firewalls and threat prevention are very important for any business of any size. Check Point's small business devices are a great fit for most any business. However, including some sort of menu or grouping for VOIP would help the small business area that has limited support. Check Point support is very knowledgeable and can also help in this area as they've helped our business evolve as well.

For how long have I used the solution?

I've been using the solution for 20 years.

What do I think about the stability of the solution?

The hardware units are solid. It is a stable solution. While you're subscription is active checkpoint fully supports your hardware and will replace if you have any uncorrectable issues.  After 20 years, I've only had to do a hardware replacement once.  Once setup, they just do what their supposed to do.

What do I think about the scalability of the solution?

The solution is very scalable. Configurations can be imported to other units.  Many levels of hardware and software are available.

How are customer service and support?

Customer service has always been very knowledgeable about their products.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Norton VPN. We switched due to the fact that we had issues with the system.

How was the initial setup?

The product offers a simple basic setup.

What about the implementation team?

We handled the implementation in-house.

What's my experience with pricing, setup cost, and licensing?

There are different levels of protection and yearly maintenance on offer.

Which other solutions did I evaluate?

We did not evaluate other options previously. 

What other advice do I have?

The support is great.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Security Specialist at Tech Mahindra Limited
Real User
Top 20
Great URL filtering, Data Loss Prevention, and mobile device connectivity
Pros and Cons
  • "Its auditing features are good for checking who did what changes and when."
  • "The URL objects take significant time in processing compared to other products like Cisco FTD; it would be better if they could improve it."

What is our primary use case?

Check Point NGFW is great in terms of functionality. We use it to control the infra outbound/inbound traffic and with it and we can block suspicious IPs directly on our SAM database instead of creating or adding in firewall rules. This not only saves time but also provides immediate protection from malicious traffic without deploying the changes in firewall gateways. 

We used to check who is doing what changes and when. We can now check logs to find why any traffic is blocked, and, if blocked, it gives good details of each error. We can easily organize all firewalls through one smart console.

How has it helped my organization?

Its GUI platform is very good. It helps us to divide up the rule base which made it easier to recognize the rules. Its SAM database gives us the amazing ability to block suspicious activity without waiting for the next change window to push the changes. In packet flows, it first checks the SAM database beforehand in order to process the packet further.

The logs give us plenty of detail as to why any packet was blocked or allowed. It really proves the purpose of getting a stateful firewall, showing the context of every packet.

What is most valuable?

The SAM database, URL/application filtering and IPS, Data Loss prevention, VPN and mobile device connectivity, stateful packet inspection, and unified management console are all useful features. 

It allows us to avoid having to go and log in to each firewall device for creating the rules as it can be done from its central console. We can manage all the firewalls and create rules and deploy them through the smart console which is really good. It helps us avoid creating the same object in each firewall. 

Its auditing features are also good for checking who did what changes and when.

What needs improvement?

The URL objects take significant time in processing compared to other products like Cisco FTD; it would be better if they could improve it. 

We have seen that whenever we configured URL objects, the CPU percentage went higher. Therefore, we started using IKP-based objects, however, in today's cloud world where every application is in the cloud and they change IPs on a random basis, whenever each new IP change happens, it's too risky to allow the whole cloud subnet (like Google or Azure). They need to therefore fix URL processing times. 

For how long have I used the solution?

I've used the solution for four years.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer947427 - PeerSpot reviewer
Technical Architect at a computer software company with 10,001+ employees
MSP
It's easier to manage and has better support than competing solutions
Pros and Cons
  • "Check Point is more expensive but easier to manage, and their presales and after-sale support are way better than Fortinet's."
  • "I would like to see Check Point add more cloud management features and better integration with LAN software-defined networking."

What needs improvement?

I would like to see Check Point add more cloud management features and better integration with LAN software-defined networking. 

What do I think about the stability of the solution?

I rate Check Point eight out of 10 for stability. 

What do I think about the scalability of the solution?

Check Point is definitely scalable.

Which solution did I use previously and why did I switch?

It really depends on the customer's deployment and environment, but we often mix and match firewalls. Check Point is more expensive but easier to manage, and their presales and after-sale support are way better than Fortinet's.

How was the initial setup?

Check Point is more complicated to deploy than Fortinet.

What's my experience with pricing, setup cost, and licensing?

Check Point needs to lower its price drastically, and the licensing model is very complex.

What other advice do I have?

I rate Check Point NGFW nine out of 10. I would only recommend it for medium to large enterprises.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
reviewer1773660 - PeerSpot reviewer
Analista de suporte at NTSec
User
Great usability and maintenance capabilities with excellent central management
Pros and Cons
  • "The management in Check Point is exceptional."
  • "At the moment it is not easy to configure some VPN S2S in Check Point."

What is our primary use case?

I support multiple environments in Brazil, including banks, schools, government, and the military, mostly with on-premise equipment. Some of these environments had more than 30 Check Point NGFW clusters and some of these have 4 on-premise appliances on each cluster, using the full capabilities of the Check Point Blades.

Using the firewall blades, and the threat prevention blades, we can provide big security for our customers. In the lo4j case, Check Point acts fast and all of the systems are already protected from the threat.

How has it helped my organization?

My organization already used Check Point before I arrived, however, compared with open-source firewalls, is in another tier. The usability and maintenance are so much better.

What is most valuable?

The management in Check Point is exceptional. The Smartconsole feature centralizes the management features, reports, log visualizing, rules, objects, et cetera.

What needs improvement?

The Check Point could use more time to upgrade the VPN configurations console. At the moment it is not easy to configure some VPN S2S in Check Point. You need to keep opening several groups, objects, and options to configure one simple VPN.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

The stability is very good!

What do I think about the scalability of the solution?

The scalability is very good.

How are customer service and support?

The initial levels of support are not that good. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used pfSense and suggest just to go for the corporative product.

What's my experience with pricing, setup cost, and licensing?

I don't have insights about the pricing for Check Point.

Which other solutions did I evaluate?

We did not evaluate other options. 

What other advice do I have?

The need to get faster bug resolving issues. For example, the R80.40 has so many bugs at the moment. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1055286 - PeerSpot reviewer
IT Security Administrator at a tech services company with 51-200 employees
Real User
Easy to manage with good features but there are security bugs that are annoying
Pros and Cons
  • "We have all the features we want or need in this appliance. It's been good so far."
  • "Sometimes there are security bugs, which is frustrating."

What is our primary use case?

We primarily use it for internet security. We use it for firewalling, ePass, and threat detection including anti-malware protection, bug protection, and social inspection. We can also use it for DLP.

What is most valuable?

The solution helps out in our security goals. It acts as a primary source of protection for threats from the internet and is great for data leakage protection.

Most of the time, it's pretty stable. 

We have all the features we want or need in this appliance. It's been good so far. 

What needs improvement?

Sometimes there are security bugs, which is frustrating.  

Right now, we have a problem with DLP and this problem has become very big. Check Point, our firewall, is not handling data properly. There seems to be some sort of security bug.

For how long have I used the solution?

I've used the solution for ten years or so. It's been a decade at least. 

What do I think about the stability of the solution?

The solution, for the most part, is very stable. We find it to be quite reliable. There are bugs, however, which have caused some issues. 

What do I think about the scalability of the solution?

The solution is not scalable per se. There is only one way to upgrade and that is to buy new appliances.

Currently, we have around 7,000 people using this solution.

Likely, we won't be increasing usage. We are building new releases and we are considering changing this solution to another vendor. We might switch from Check Point to maybe Palo Alto or Cisco. We don't know which yet.

How are customer service and support?

We haven't really dealt with technical support. We typically go through our partners.

Which solution did I use previously and why did I switch?

We also use Cisco as well. We use Cisco ASA. Check Point, right now, is our primary firewall.

Check Point offers very good management. For an administrator, it's easy to manage this appliance, this firewall. Cisco, historically, has a big problem with this, specifically with FTD firewalls. There also tend to be some bugs you have to contend with.

How was the initial setup?

I can't speak to the initial setup process. Our partner handled it and therefore I wasn't really part of the process. That said, for me. the process is pretty simple.

My understanding is that the deployment took a few days. 

I'd rate the experience of the initial setup at a four out of five. 

About two people were able to handle the implementation process. Typically, they are architects and engineers. 

What about the implementation team?

We had a partner set up the solution for us.

What was our ROI?

We have seen a decent ROI. I'd rate it at a four out of five. 

What's my experience with pricing, setup cost, and licensing?

I can't speak to the cost of the solution. We deal with it through a partner, and I'm not involved in any of the pricing aspects. 

Which other solutions did I evaluate?

We are considering switching to Palo Alto or maybe Cisco in the near future. 

What other advice do I have?

We are a customer and an end-user.

Some blades, some function blades on Check Point, are very good, however, it's not all of them. Right now, I know DLP and social inspection are a problem. New users should be aware of this. 

Overall, I would rate the solution at a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.