What is our primary use case?
We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.
The solution addresses the Security requirements at Perimeter Layer including:
- Network IPS
- Application Control
- IPSEC VPN
- SSL VPN.
- Proxy
It was required to enable IPSEC VPN between our vendors across the world
We got positive responses on Check Point Firewalls from our vendors as well.
Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.
How has it helped my organization?
We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.
This solution addressed most of our needs but required multiple license subscriptions.
Below are the few Business use cases we achieved through Check Point NGFW:
- SSL VPN with Security Posture Assessment
- SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
- Content Filtering (Identity Awareness and DLP)
- Forward Proxy with Web and Application Control
- Enabling Anti-Bots and IPS
What is most valuable?
The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.
Anti-Bots and IPS enabled security on the network traffic.
Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.
The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.
What needs improvement?
It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.
We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B
Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.
We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.
Please concentrate on local services enablement for faster resolutions.
For how long have I used the solution?
We have been using this solution since July 2020.
What do I think about the stability of the solution?
Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.
What do I think about the scalability of the solution?
The solution is scalable in terms of enabling the features and deploying management servers.
How are customer service and support?
We would recommend they have regular feedback sessions with customers.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We used another firewall that enables basic security features with lot of limitations.
How was the initial setup?
We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.
What about the implementation team?
Our In-house team handled the implementation.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.
Which other solutions did I evaluate?
We evaluated Palo Alto and FortiGate.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.