Try our new research platform with insights from 80,000+ expert users
reviewer1670154 - PeerSpot reviewer
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
Scalable, stable, and configurable
Pros and Cons
  • "Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment."
  • "The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long."

What is our primary use case?

We use Check Point Gateways for securing our data centers including DMZ networks as well as gateways for our branch offices around the world. They are connected via MPLS, internet, or site-to-site VPNs depending on the branch connectivity.

A minimum standard for the whole environment is the NGFW. Firewall rules according to our security policy. VPN for site-to-site tunnels to our own gateways or to partners and customers. IPS is set primarily to prevent, and for some signatures to detect. 

Application Control is still in the early stages.

How has it helped my organization?

Firewalling is one of Check Point's core business attributes, and it just works.

Creating site-to-site VPNs between Check Point Gateways that are within the same management is unbelievably easy. If you create VPNs for 3rd parties and there are mismatches or issues, you will see logs that help pinpoint issues or misconfiguration.

Application control help with identifying applications and therefore makes firewall rules easier since changing ports don't have to be adapted every time an application changes or updates.

What is most valuable?

Generally speaking, all features are well documented and the two platforms help with configuration. Documentation and knowledgebase articles in the user center as well as user recommendation within the forums are great. The Admin Guides are really well documented, but it's a lot to read.

Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment. The best example would be the CDT tool which helps with decreasing the amount of time for upgrading whole environments.

What needs improvement?

The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long. R81 promises at least parallel policy installations, which help in larger environments.

Check Point's advantage (to be able to configure everything) is also a disadvantage. The environment is quite complex. Troubleshooting is not always easy as there are a lot of possible debugs that can be taken, and the support will not always send the right or necessary debugs. Some debugs also can cause a heavy load, so you have to keep an eye on what you troubleshoot.

Buyer's Guide
Check Point NGFW
April 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.

For how long have I used the solution?

Our company has used Check Point for well over 10 years.

What do I think about the stability of the solution?

If it's running, it's stable. New setups have to be tested though.

What do I think about the scalability of the solution?

The solution can be scaled from very small branch offices to huge data centers or even cloud data centers.

How are customer service and support?

Support depends on how well you describe the issue and send information. Sometimes escalation is necessary.

How was the initial setup?

The more features (blades) are turned on, the more complex the environment becomes. If something goes wrong, you have to rule out several issues (hardware, blades, et cetera).

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Daphne - PeerSpot reviewer
Project Manager at Junta de Andalucia
Real User
Good VPN and deep packet inspection capabilities, helpful reporting
Pros and Cons
  • "The most valuable feature is the powerful, deep packet inspection engine."
  • "There should be better integration with our current NAC solution to increase the granularity of policies that we implement."

What is our primary use case?

Our primary use case is to secure the perimeter and users in our network.

We use IPS/IDS, deep packet inspection, and VPN.

How has it helped my organization?

Our network performance and safety have improved. The reporting also gives us more information about our network, including cost and risk reduction.

This solution helps to keep our network safe and secure, protecting our investment.

What is most valuable?

The most valuable feature is the powerful, deep packet inspection engine.

The management console and diagnostic tools are powerful and we are happy with them.

The reporting is detailed and helpful.

What needs improvement?

There should be better integration with our current NAC solution to increase the granularity of policies that we implement.

For how long have I used the solution?

We have been using the Check Point NGFW for two years.

What other advice do I have?

Overall, this is a very complete tool.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point NGFW
April 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
Easy to configure and upgrade, helpful support, and it performs well
Pros and Cons
  • "The software upgrade procedure is very easy; it just needs few clicks & we are done."
  • "One of the most complicated aspects is the VPN Configuration, which should be simplified in future releases."

What is our primary use case?

We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers.

Currently, we are using the R80.20 firmware version and we have a pretty simple design.

Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.

How has it helped my organization?

With Check Point, we achieved redundancy but the problem was three public IP addresses that were required to be configured as HA, with two physical IPs & one virtual IP.

Our previous firewall used a single public IP but now, with Check Point using three, it became very difficult for us to make available the same segment of public IP addresses from our ISP. After many support calls, however, we found a solution.

The other option which is helpful is that there are no limits for any objects used in the policy. Our previous firewall does support limited time objects & IP address objects.

What is most valuable?

Check Point's new Smart dashboard has an all-in-one configuration interface. They provide a very easy configuration for NAT and one tick for source & destination NAT is possible.

Policies can be configured in a more organized way using a section & layered approach.

Application control has all of the required application data to introduce it into policy and the URL filtering works great, although creating regular expressions is complicated.

The software upgrade procedure is very easy; it just needs few clicks & we are done.

What needs improvement?

Check Point has both GUI (Graphical Interface) & smart dashboard, but it will be better if it sticks to either one of them. 

A threat prevention policy needs to be created in a different tab but instead, if those policies could be related to access policy then it will be easier to apply the threat prevention to our relevant traffic.

One of the most complicated aspects is the VPN Configuration, which should be simplified in future releases. The monitor tab should have a VPN tab, where we can see the current tunnel status.

For how long have I used the solution?

I have been using Check Point NGFW for more than the last three years.

What do I think about the stability of the solution?

With respect to stability, we always have ongoing support calls. We have faced lots of issues that have led to upgrading with a Hotfix.

What do I think about the scalability of the solution?

When it comes to scalability, our current Check Point is far better than our previous firewall.

How are customer service and technical support?

Technical support is very helpful & always there to help us with issues. Also, the TAC response is quick.

Which solution did I use previously and why did I switch?

Previously, we had a Fortinet firewall, which was pretty slow when it came to operations.

How was the initial setup?

The initial setup was simple.

What about the implementation team?

We implemented the firewalls with our in-house team.

What's my experience with pricing, setup cost, and licensing?

Check Point should provide some basic license for mobile access VPN by default, for at least five to ten users.

Which other solutions did I evaluate?

The only other vendor that we have evaluated is Fortinet.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Network and Security Analyst at a pharma/biotech company with 11-50 employees
Real User
Enables us to meet compliance requirements and maintains our security posture
Pros and Cons
  • "It filters unwanted traffic."
  • "There are some issues compared to other products. Ease of use is one."

What is our primary use case?

It's simply a firewall.

How has it helped my organization?

  1. Enables us to meet compliance requirements.
  2. It maintains our security posture.

What is most valuable?

Filtering. It filters unwanted traffic.

What do I think about the stability of the solution?

Their products are pretty robust but, at the same time, we deployed ours in HA mode so we don't really worry about downtime, we have redundancy. We've never had any problems.

What do I think about the scalability of the solution?

We have the right appliance for our specifications. If we wanted to get a bigger box then we will just get a bigger box based on our requirements.

How is customer service and technical support?

We tend to go to our reseller for technical support.

How was the initial setup?

The setup wasn't complex. I went to training and after training it pretty much all made sense. I was prepared for it.

What other advice do I have?

Do your homework and make sure it fits. You have to know exactly what you want, what your requirements are. Make sure that whatever product you are actually going for meets your requirements, suits your infrastructure and how your IT operates.

What I look at when selecting a vendor is how long the vendor has been around, the level of focus on technology, how good they are. And one of the most important things we do is check industry ratings. That's one of the first things we look at, to see which vendors to consider.

I would rate Checkpoint eight out of 10. To get to a 10, there are some issues compared to other products. Ease of use is one. Also, I can never give any product a 10 out of 10. It's just impossible. There's always something definitely missing.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Nice portal, good security, and great dashboards
Pros and Cons
  • "The solution is easy to administer thanks to its dashboards. The monitoring is really useful."
  • "Currently, some prices are very expensive."

What is our primary use case?

We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop.

Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.

How has it helped my organization?

Thanks to Check Point, we managed to carry out a better security implementation. By placing one in a workshop, we managed to solve issues with attacks and malware.

The solution is easy to administer thanks to its dashboards. The monitoring is really useful.

What is most valuable?

The most valuable aspects include:

  • Mobile security. Check Point NGFW includes mobile security features that enable you to secure mobile devices and protect against threats such as mobile malware and phishing attacks.
  • Scalability: Check Point NGFW is highly scalable and can support large networks with high traffic volumes. 
  • What needs improvement?

    The best improvements to be considered are:

    • Improvements in the time and attention given to solutions for generated cases.
    • Licensing that is more comfortable and affordable. Currently, some prices are very expensive.
    • In terms of language in the application, they could better facilitate the handling of others.

    For how long have I used the solution?

    This is an excellent product of the new generation, administered in the Infinity Portal. We have used the product for at least two years.

    Which solution did I use previously and why did I switch?

    Previously, we had not carried out verifications of other devices.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1260276 - PeerSpot reviewer
    Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
    Reseller
    Top 20
    Great for content filtering and enabling anti-bots and IPS enabled security
    Pros and Cons
    • "The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution."
    • "Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes."

    What is our primary use case?

    We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.

    The solution addresses the Security requirements at Perimeter Layer including:

    1. Network IPS
    2. Application Control
    3. IPSEC VPN
    4. SSL VPN.
    5. Proxy

    It was required to enable IPSEC VPN between our vendors across the world

    We got positive responses on Check Point Firewalls from our vendors as well.

    Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.

    How has it helped my organization?

    We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.

    This solution addressed most of our needs but required multiple license subscriptions.

    Below are the few Business use cases we achieved through Check Point NGFW:

    1. SSL VPN with Security Posture Assessment
    2. SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
    3. Content Filtering (Identity Awareness and DLP)
    4. Forward Proxy with Web and Application Control
    5. Enabling Anti-Bots and IPS

    What is most valuable?

    The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.

    Anti-Bots and IPS enabled security on the network traffic.

    Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.

    The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.

    What needs improvement?

    It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.

    We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B

    Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.

    We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.

    Please concentrate on local services enablement for faster resolutions.

    For how long have I used the solution?

    We have been using this solution since July 2020.

    What do I think about the stability of the solution?

    Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.

    What do I think about the scalability of the solution?

    The solution is scalable in terms of enabling the features and deploying management servers.

    How are customer service and support?

    We would recommend they have regular feedback sessions with customers.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We used another firewall that enables basic security features with lot of limitations.

    How was the initial setup?

    We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.

    What about the implementation team?

    Our In-house team handled the implementation. 

    What's my experience with pricing, setup cost, and licensing?

    I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.

    Which other solutions did I evaluate?

    We evaluated Palo Alto and FortiGate.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    IT Consultant/Engineer at a computer software company with 11-50 employees
    User
    Great scalability with an updated management console and convenient implementation
    Pros and Cons
    • "We found a very successful implementation of the virtual private network client, since, for some time now, everyone has been working from home."
    • "You need to merge all the old consoles into one new one and make the interface more convenient for the novice administrator."

    What is our primary use case?

    Our organization implements, maintains, and operates Check Point's firewall. 

    Check Point solutions were implemented by our organization in accordance with the project documentation and further adjusted at the request of the customer. 

    We ourselves also use a Check Point firewall in conjunction with a firewall from another vendor - both to protect our network perimeter and to test various functions and new emerging firewall capabilities and identify various bugs before they reach customers in the product environment.

    How has it helped my organization?

    We and our customers use almost the entire palette of capabilities of the firewall solution from Check Point. We use almost every feature, from anti-spoofing and network segmentation to URL filtering and intrusion prevention systems. We also willingly use virtual private networks from Check Point, both site to site and client to site. We also leverage the antivirus blade and anti-DDoS attacks. Some of our customers use Check Point capabilities for mobile devices, which are also successfully implemented in the firewall.

    What is most valuable?

    We found a very successful implementation of the virtual private network client, since, for some time now, everyone has been working from home. With the firewall from Check Point, this function is implemented very conveniently and securely. 

    A convenient new version of the firewall management console, which, starting with the R80 version, has become standard for many Check Point blades, however, unfortunately, not for all. You still need to use older consoles to manage some features. For example, to access the monitoring blade, I need the old console, but the new console should start it.

    What needs improvement?

    You need to merge all the old consoles into one new one and make the interface more convenient for the novice administrator. Until now, the initial settings as well as subsequent changes to the "iron" part of the firewall, namely its interfaces, routing, or DCCP settings, you must use the web interface through a browser. This is inconvenient. Of course, you can use the command-line for these purposes, however, this also complicates the configuration process for the administrator and requires a well-known habit.

    For how long have I used the solution?

    I've used the solution for six years.

    What do I think about the stability of the solution?

    There is room for improvement in terms of stability.

    What do I think about the scalability of the solution?

    The scalability is great.

    How are customer service and support?

    Technical support could sometimes be better.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have used and still use solutions from Sophos, however, in Check Point, some functions are implemented more conveniently. For example, work with logs.

    How was the initial setup?

    Before installing, I recommend to go through the training.

    What about the implementation team?

    I handled the implementation myself.

    What was our ROI?

    The ROI is good.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1724517 - PeerSpot reviewer
    Senior Infrastructure Technical Analyst at https://www.linkedin.com/in/robchaykoski/
    User
    Excellent management interface and logging facility with good stability
    Pros and Cons
    • "By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass."
    • "I would like to see better Data Leakage protection options and easier-to-understand deployment models for this."

    What is our primary use case?

    I protect customers and other types of data by ensuring a secure environment. Check Point allows me to deploy quickly and securely, along with using more advanced detection and prevention. By securing multiple sites and various infrastructure elements, I have reduced my overall workload.

    I'm using a lot of permanent tunnels and protecting them to ensure that monitoring customer infrastructure is not compromised in any way, shape, or form.

    Various hardware has been deployed at proper sizing for customers and the equipment is stable without the need for a lot of custom configuration

    How has it helped my organization?

    By deploying Check Point, it has made it easier to manage everything from a single interface. The management dashboard and policies are on its single pane of glass. This has allowed for faster resolution of problems during deployment.

    Being able to look at log events and sort quickly for information in regards to problems with connectivity or traffic makes it easier to troubleshoot and gain other insights into traffic-related problems.

    Overall, the insights provided also allow for data to be presented to customers to give them an overall perspective of their security.

    What is most valuable?

    The management interface is well designed and easy to understand. It reduces the time for deployment, changes, and onboarding new customers.

    The logging facility is amazing and gives great insights into traffic. Although Event Management is also amazing, it can be cost-prohibitive for other companies to onboard.

    The ability to deploy VPN communities makes onboarding new sites easy. Multi-site configurations can be deployed with very little oversight and with minimal additional work after the initial deployment is successful.

    What needs improvement?

    I would like to see better Data Leakage protection options and easier-to-understand deployment models for this. I have been working with DLP for a while now and find that other vendors seem to be doing better at this. That said, having to deploy another solution adds other costs.

    Some error messages could be better and more specific. The days of generic error messages should be over by now to allow faster, better insights into fixes for any traffic-related problems.

    Some of the sizings of firewalls for deployment seem not exact and require some tweaking based on real-world traffic and connectivity types (for example, PPPoE).

    For how long have I used the solution?

    I have been deploying Check Point firewalls for about 12 years and still work with them on many projects. I trust them to protect my infrastructure along with other tools.

    I will continue to use Check Point as long as they keep pace with the innovation currently in place without sacrificing customer service.

    What do I think about the stability of the solution?

    The product is very stable once deployed.

    What do I think about the scalability of the solution?

    So far, no issues with scalability have been detected - other than hardware replacement on the growth of traffic

    How was the initial setup?

    The initial setup has some come complexities, however, that is the nature with multiple types of connectivity and different customer requirements.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: I am a partner with Check Point
    PeerSpot user
    Buyer's Guide
    Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2025
    Buyer's Guide
    Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.