I'm at a university in Queretaro, Mexico and it's used to protect our infrastructure: wireless, LAN, PCs. Since the solution prevents attacks, we have the checkpoint in all our equipment, from the critical infrastructure to the directors' and employees' cell phones.
IT Director at Facultad de Ciencias Actuariales, Universidad Anáhuac México
The best enterprise solution for cybersecurity protection
Pros and Cons
- "A stable solution with multiple interfaces"
- "Complex and not very easy to use."
What is our primary use case?
How has it helped my organization?
This is the best enterprise solution. Almost every university in Mexico has Fortinet or VXN, but our mission is to have the best cybersecurity protection for our information and our users. We're a private university and our clients and information are the priority. This is the reason why I chose Check Point NGFW.
What is most valuable?
The solution interface is good. It has three different ones: the NGFW, the Endpoint, and Harmony Mobile.
For how long have I used the solution?
I've been using this solution for five years.
Buyer's Guide
Check Point NGFW
July 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
The scalability of this solution is good.
How are customer service and support?
Because my employees work in other departments, we used the deployment consultant. The service was very good.
How was the initial setup?
The setup was simple because we had the checkpoint expert support. The time it took was standard and once the installation was complete, there was no problem at all.
What's my experience with pricing, setup cost, and licensing?
The setup was simple because we had our partner and checkpoint expert support. The time it took was standard and once the installation was complete, there was no problem at all.
What other advice do I have?
I would rate this solution a nine out of ten. This is a very good solution. It's complex because it's not too easy to use, but the brand and our partner help us with NG Firewall configuration issues or other solutions like Harmony.
The university is growing every year and with that, I purchase more endpoint licenses and Harmony Endpoint because the firewall works well on the dimension and capacity. Next year, we plan to integrate Harmony Email and Office. The solution also prevents threats to Office 365.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
Great for content filtering and enabling anti-bots and IPS enabled security
Pros and Cons
- "The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution."
- "Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes."
What is our primary use case?
We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.
The solution addresses the Security requirements at Perimeter Layer including:
- Network IPS
- Application Control
- IPSEC VPN
- SSL VPN.
- Proxy
It was required to enable IPSEC VPN between our vendors across the world
We got positive responses on Check Point Firewalls from our vendors as well.
Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.
How has it helped my organization?
We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.
This solution addressed most of our needs but required multiple license subscriptions.
Below are the few Business use cases we achieved through Check Point NGFW:
- SSL VPN with Security Posture Assessment
- SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
- Content Filtering (Identity Awareness and DLP)
- Forward Proxy with Web and Application Control
- Enabling Anti-Bots and IPS
What is most valuable?
The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.
Anti-Bots and IPS enabled security on the network traffic.
Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.
The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.
What needs improvement?
It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.
We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B
Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.
We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.
Please concentrate on local services enablement for faster resolutions.
For how long have I used the solution?
We have been using this solution since July 2020.
What do I think about the stability of the solution?
Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.
What do I think about the scalability of the solution?
The solution is scalable in terms of enabling the features and deploying management servers.
How are customer service and support?
We would recommend they have regular feedback sessions with customers.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used another firewall that enables basic security features with lot of limitations.
How was the initial setup?
We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.
What about the implementation team?
Our In-house team handled the implementation.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.
Which other solutions did I evaluate?
We evaluated Palo Alto and FortiGate.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point NGFW
July 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.
IT Consultant/Engineer at a computer software company with 11-50 employees
Great scalability with an updated management console and convenient implementation
Pros and Cons
- "We found a very successful implementation of the virtual private network client, since, for some time now, everyone has been working from home."
- "You need to merge all the old consoles into one new one and make the interface more convenient for the novice administrator."
What is our primary use case?
Our organization implements, maintains, and operates Check Point's firewall.
Check Point solutions were implemented by our organization in accordance with the project documentation and further adjusted at the request of the customer.
We ourselves also use a Check Point firewall in conjunction with a firewall from another vendor - both to protect our network perimeter and to test various functions and new emerging firewall capabilities and identify various bugs before they reach customers in the product environment.
How has it helped my organization?
We and our customers use almost the entire palette of capabilities of the firewall solution from Check Point. We use almost every feature, from anti-spoofing and network segmentation to URL filtering and intrusion prevention systems. We also willingly use virtual private networks from Check Point, both site to site and client to site. We also leverage the antivirus blade and anti-DDoS attacks. Some of our customers use Check Point capabilities for mobile devices, which are also successfully implemented in the firewall.
What is most valuable?
We found a very successful implementation of the virtual private network client, since, for some time now, everyone has been working from home. With the firewall from Check Point, this function is implemented very conveniently and securely.
A convenient new version of the firewall management console, which, starting with the R80 version, has become standard for many Check Point blades, however, unfortunately, not for all. You still need to use older consoles to manage some features. For example, to access the monitoring blade, I need the old console, but the new console should start it.
What needs improvement?
You need to merge all the old consoles into one new one and make the interface more convenient for the novice administrator. Until now, the initial settings as well as subsequent changes to the "iron" part of the firewall, namely its interfaces, routing, or DCCP settings, you must use the web interface through a browser. This is inconvenient. Of course, you can use the command-line for these purposes, however, this also complicates the configuration process for the administrator and requires a well-known habit.
For how long have I used the solution?
I've used the solution for six years.
What do I think about the stability of the solution?
There is room for improvement in terms of stability.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
Technical support could sometimes be better.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used and still use solutions from Sophos, however, in Check Point, some functions are implemented more conveniently. For example, work with logs.
How was the initial setup?
Before installing, I recommend to go through the training.
What about the implementation team?
I handled the implementation myself.
What was our ROI?
The ROI is good.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Networking engineer at Hewlett Packard Enterprise
Great Identity-Based Inspection Control with pleasant technical support and good scalability
Pros and Cons
- "The Identity-Based Inspection Control gives us the ability to leverage the organization’s Microsoft AD, LDAP, RADIUS, and Cisco pxGrid."
- "With the increase of volume of traffic, the required resource/hardware to properly run goes up. Therefore, the hardware engineering to architecture flow has to be more efficient."
What is our primary use case?
Working in an MSP environment, there are more than a hundred firewalls and we use Check Point NGFW firewall which is mainly implemented as perimeter security and internal segmentation firewall.
Due to our requirements, we implement site-to-site VPN between clients and cloud providers (AWS/Goggle/Azure). The centralized managed infrastructure makes it simple for the IT staff to operate and monitor the firewalls.
The Smart Console provides a single pane of glass that allows the IT staff to easily manage the environment and troubleshoot issues.
How has it helped my organization?
The Smart Console provides a single pane of glass that allows the IT staff to easily manage the environment and troubleshoot issues.
The UI decreases the hours required to complete a task. It also incorporates compliance and audit control validation into the system.
IT staff can construct a single policy across all enforcement points in the Infinity architecture.
There's a unified policy table that combines threat prevention and segmentation policies.
SmartEvent allows consolidated event management and export.
What is most valuable?
The Identity-Based Inspection Control gives us the ability to leverage the organization’s Microsoft AD, LDAP, RADIUS, and Cisco pxGrid.
The Terminal Servers group membership allows policies to automate typical processes (user moves/add/changes) and decrease configuration changes required on the firewall, which is tremendously beneficial. This limits the integration with the identity store to just one interface, and we still get broad security coverage based on a single set of identity policies.
We leverage the combination of identity and application awareness, which is mandatory in order to build scalable security policies that protect the business without compromising user experience. This feature is extended to the SmartEvent console.
What needs improvement?
The SmartEvent blade has a huge number of security events/logs. We are trying to find correlation with the help of the SmartEvent blade, however, it may impact the performance of our Check Point management server. It requires additional licenses for Check Point management servers. It should be inbuilt within the management server.
With the increase of volume of traffic, the required resource/hardware to properly run goes up. Therefore, the hardware engineering to architecture flow has to be more efficient.
For how long have I used the solution?
I've used the solution actively since 2008.
What do I think about the stability of the solution?
There were moments of where it did struggle when the rules were not properly maintained meaning that rules clean up exercise has to be performed annually to prune out rules no longer being use to allow the firewall to function more efficiently.
What do I think about the scalability of the solution?
Overall, the product handles a production workload like a champ.
How are customer service and support?
Customer service was pleasant.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Working in an MSP, we have multiple vendors/principals of NGFWs.
How was the initial setup?
You have to work with a sales account manager to get the best price.
What about the implementation team?
You need to work with a vendor that is overall quite knowledgeable.
What's my experience with pricing, setup cost, and licensing?
The solution should be evaluated and a trial run should be done in the lab as Check Point provides VM instances that can be installed on an open server box. Make sure to check with sales about the features and if they require additional licenses before purchasing.
Which other solutions did I evaluate?
Working in MSP, we have looked at various NGFWs. Check Point is one of them.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at Netpoleons
Good packet filtering and proxy firewalls with an excellent intrusion prevention system
Pros and Cons
- "One of the solution's best features include a packet-filtering firewall that examines packets in isolation."
- "One of the main features that need improvement is the rule filter export."
What is our primary use case?
What can you do about threats that get past simple packet inspection by a regular firewall? You could have a layer 3 firewall inspect the protocol and block known threats from certain URLs, however, what if it comes from a URL that has not been reported and is a socially engineered exploit designed to hijack your data? This is where a Layer 7 firewall will be able to inspect the application, known as payload inspection.
While this is possible to do with a Layer 3 firewall, it can be difficult due to the number of protocol messages in Layer 7. You would need to create a signature for each application you wanted to protect; however, network signatures tend to block legitimate data and increase your MTTR (mean time to resolve an issue).
Plus, having these signatures makes it hard to manage and keep up with by the IT staff. Relying on the power of AI and the cloud in order to leverage the Layer 7 firewall is key. The advantage of Layer 7 is its protocol awareness, which allows it to differentiate between different network traffic (application knowledge) and not just packets or flows that identify ports and IPs (Layer 3).
How has it helped my organization?
Let's say most of the traffic nowadays goes through HTTP, your web browser.
When you browse the web, what do you suspect happens? Your browser sends HTTP requests to servers around the world, and in return, you receive a response. Big data packets originate from business applications as well, such as file transfer protocols (FTP) or web services such as MapReduce or Twitters API. Oftentimes, a breach happens through these protocols, whereby a Layer 3 firewall could potentially let the threat in (such as SQL injection by default) without explicitly denying these requests.
What is most valuable?
The solution's best features include:
- A packet-filtering firewall that examines packets in isolation and does not know the packet's context.
- A stateful inspection firewall that examines network traffic to determine whether one packet is related to another packet.
- A proxy firewall (aka application-level gateway) that inspects packets at the application layer of the Open Systems Interconnection (OSI) reference model.
- A Next-Generation Firewall (NGFW) that uses a multilayered approach to integrate enterprise firewall capabilities with an intrusion prevention system (IPS) and application control.
What needs improvement?
One of the main features that need improvement is the rule filter export. All of the other vendors can export the filtered IPS as a PDF or CSV file, however, with the smart dashboard, it’s just not possible. One can only export the whole rule base and then search for the IPS, which is super time-consuming as you can’t send the whole rule base to a customer. You would get weird questions about certain rules such as why they are deployed or configured as they are, and maybe even get unwanted tips on how to change them.
For how long have I used the solution?
I've used the solution for four years.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
The costs involved depend on your needs and budget.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Infrastructure Technical Analyst at https://www.linkedin.com/in/robchaykoski/
Excellent management interface and logging facility with good stability
Pros and Cons
- "By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass."
- "I would like to see better Data Leakage protection options and easier-to-understand deployment models for this."
What is our primary use case?
I protect customers and other types of data by ensuring a secure environment. Check Point allows me to deploy quickly and securely, along with using more advanced detection and prevention. By securing multiple sites and various infrastructure elements, I have reduced my overall workload.
I'm using a lot of permanent tunnels and protecting them to ensure that monitoring customer infrastructure is not compromised in any way, shape, or form.
Various hardware has been deployed at proper sizing for customers and the equipment is stable without the need for a lot of custom configuration
How has it helped my organization?
By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass. This has allowed for faster resolution of problems during deployment.
Being able to look at log events and sort quickly for information in regards to problems with connectivity or traffic makes it easier to troubleshoot and gain other insights into traffic-related problems.
Overall, the insights provided also allow for data to be presented to customers to give them an overall perspective of their security.
What is most valuable?
The management interface is well designed and easy to understand. It reduces the time for deployment, changes, and onboarding new customers.
The logging facility is amazing and gives great insights into traffic. Although Event Management is also amazing, it can be cost-prohibitive for other companies to onboard.
The ability to deploy VPN communities makes onboarding new sites easy. Multi-site configurations can be deployed with very little oversight and with minimal additional work after the initial deployment is successful.
What needs improvement?
I would like to see better Data Leakage protection options and easier-to-understand deployment models for this. I have been working with DLP for a while now and find that other vendors seem to be doing better at this. That said, having to deploy another solution adds other costs.
Some error messages could be better and more specific. The days of generic error messages should be over by now to allow faster, better insights into fixes for any traffic-related problems.
Some of the sizings of firewalls for deployment seem not exact and require some tweaking based on real-world traffic and connectivity types (for example, PPPoE).
For how long have I used the solution?
I have been deploying Check Point firewalls for about 12 years and still work with them on many projects. I trust them to protect my infrastructure along with other tools.
I will continue to use Check Point as long as they keep pace with the innovation currently in place without sacrificing customer service.
What do I think about the stability of the solution?
The product is very stable once deployed.
What do I think about the scalability of the solution?
So far, no issues with scalability have been detected - other than hardware replacement on the growth of traffic
How was the initial setup?
The initial setup has some come complexities, however, that is the nature with multiple types of connectivity and different customer requirements.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. I am a partner with Check Point
Senior Network Engineer at Arvest Bank Group
Unstable with unreliable hardware and poor technical support
Pros and Cons
- "The only area that Check Point still seems to excel in is their logging."
- "Check Point's support, at all levels, needs a complete overhaul."
What is our primary use case?
Check Point firewalls are/were deployed in various parts of our network to achieve perimeter defense and internal network segmentation.
In addition to the firewall functionality, each appliance also leveraged Check Point's IPS blades. The perimeter Check Point appliances were also responsible for terminating any and all site-to-site VPN connections with third parties.
All traffic from remote locations, remote VPN users, and egress traffic to the internet is filtered through the Check Point equipment at some point in our network.
How has it helped my organization?
Check Point has not improved our organization. We have observed a sharp decline in the quality of both products and support.
Over the last several years, there has not been a single week where we have not had an outstanding issue open with Check Point support's advanced tier teams.
Initially, we had incredibly impactful issues regarding their scalable platform hardware (which is being discontinued in favor of Maestro) to the point we were forced to rip them out due to them being completely unreliable.
Check Point support has also seen a significant drop in quality, despite my organization even being a Diamond Support customer with Check Point. We fully believe it would be a wiser investment of time to call Geek Squad rather than Check Point.
What is most valuable?
The only area that Check Point still seems to excel in is their logging. Reviewing logs on Check Point is a snappy and intuitive process that allows the end-user to filter down traffic to specifically what they're looking for very easily and even with little knowledge of Check Point.
The ability to create filters on the fly in the GUI with simple clicks to various areas of the log is fantastic and allows one to find exactly what they're looking for with very little effort. Note that this is probably the only thing Check Point still has going for it.
What needs improvement?
Check Point's support, at all levels, needs a complete overhaul. The Check Point support staff aren't even shy about telling you how understaffed, underpaid, and underappreciated they are. Any engineer with a hint of talent is pulled from general support to higher tiers, and then, once they reach a level of competency above that of your average acorn, they leave for better-paying jobs elsewhere.
My organization witnessed this first hand fighting through the lower tiers of support and working frequently with the scalable platform team. When we switched to Diamond Support we saw no significant improvement in support save for shorter hold times.
For how long have I used the solution?
I have personally used Check Point solutions for nearly ten years. My organization has used Check Point for 15+ years.
What do I think about the stability of the solution?
The solution is absolutely unstable. My organization follows vendor best practices exactly and has every deployment vetted by multiple levels within the vendor. Despite this, Check Point hardware has repeatedly proved unreliable at best, sometimes resulting in total outages for our company.
Which solution did I use previously and why did I switch?
My current organization has used Check Point for the relevant past and is only recently completely switching vendors to Palo Alto.
What was our ROI?
All current Check Point hardware is destined for the recycle bin. There is a pretty low ROI.
What's my experience with pricing, setup cost, and licensing?
Most firewall vendors, Check Point included, make the selection of hardware easy enough based on projected usage. Likewise setup on many vendors in greenfield environments is simple enough and should not require professional services.
Which other solutions did I evaluate?
I was not involved with the initial deployment of Check Point in our environment as it was before my time. However, each subsequent deployment I have been involved in with Check Point was used based on the existing relationship. Once the issues became too impactful and we realized we had no hope of seeing any improvements we began efforts to rip out the existing Check Point equipment.
What other advice do I have?
Do not let Check Point's past success lure you into their current state of bottom of the barrel.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Contracted IT Staff at Sağlık Bakanlığı-Turkish Ministry of Health
User-friendly, easy to configure, and great for corporate environments
Pros and Cons
- "It is a very friendly platform and easy to configure."
- "It is a bit expensive according to the required blades but it is a platform that is worth having as security in a corporate."
How has it helped my organization?
It is a bit expensive according to the required blades but it is a platform that is worth having as security in a corporate.
What is most valuable?
I have worked for several years with the Check Point platform (NGFW) and it is by far the most stable in hardware and software.
It is a very friendly platform and easy to configure. It is true that it is a bit expensive (according to the required blades), however, it is a platform that is worth having as security in a corporate environment.
For how long have I used the solution?
I've used the solution for more than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Meraki MX
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?