Our customer’s infrastructure is entirely based on Check Point. They are using around 2,000 firewalls worldwide. We resolve the problems in their product as a service provider.
Network and Security Engineer at BT - British Telecom
Provides excellent security and doesn't compromise the users’ performance
Pros and Cons
- "The tool provides great security."
- "The tool’s architecture could be improved a bit."
What is our primary use case?
What is most valuable?
Check Point is a great technology. It doesn't compromise the performance of the users. The tool provides great security. It was the first firewall that provided 3-way handshake. It was the first stateful firewall in the market.
What needs improvement?
The tool’s architecture could be improved a bit. It should provide Single-Pass Parallel Processing. Check Point’s interface is quite segregated.
For how long have I used the solution?
I have been using the solution for seven to eight years.
Buyer's Guide
Check Point NGFW
June 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the stability of the solution?
The tool will be stable if the implementation team has done a good job.
What do I think about the scalability of the solution?
The tool is scalable. If a user faces any constraints, we can upgrade the tool. The hardware is scalable. Our customers are enterprise-level businesses.
How are customer service and support?
The technical support team is not excellent. It’s not easy to get people on call on urgent tickets. They join the call, but the support is not as smooth as other vendors like Cisco and Zscaler.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Palo Alto provides Single-Pass Parallel Processing. Palo Alto and Check Point are not very different.
How was the initial setup?
The product is easy to install. It's an interesting product. Once we get the knowledge of Check Point, it's quite easy to work on. However, for new users, the solution is a bit difficult. For a single gateway, if we are ready with all the necessary software we need while installing, the deployment takes one to two hours.
A single-site deployment, where all gateways and management are taken care of, can be done by one or two people. However, a complete implementation team is required if some things are to be done on the cloud and some in the branch offices. One team will handle the policies, and the other will handle the basic installations. Once the solution is stabilized, maintenance will be easy.
What other advice do I have?
Check Point is a good tool. I would recommend it to others. Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP

Senior Manager ICT & Innovations at Bangalore International Airport Limited
A scalable and user-friendly tool that can be customized and deployed easily
Pros and Cons
- "The product is very user-friendly."
- "It will be good if the product is rack-mounted."
What is our primary use case?
We use the solution as a perimeter firewall. We also use it for endpoint security and VPN.
What is most valuable?
The product is very user-friendly. The configuration can be managed and customized as required. We can customize the tool for each stakeholder.
What needs improvement?
It will be good if the product is rack-mounted. The product must be updated to protect users from the latest firewall threats.
For how long have I used the solution?
I have been using the solution for almost six years.
What do I think about the stability of the solution?
The tool is very stable.
What do I think about the scalability of the solution?
The tool is easily scalable. Almost 2000 people are using the product in my organization.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We also work with other vendors. Check Point is as good as its competitors, but its cost is a bit higher.
How was the initial setup?
The initial setup is very easy. One firewall engineer can deploy the product within a few hours. It is very easy to maintain the tool. We need only one person to maintain it.
What's my experience with pricing, setup cost, and licensing?
The tool is a bit expensive. The product’s operational cost is very high. We pay a yearly licensing fee. We also pay for support.
What other advice do I have?
Check Point is the most user-friendly solution. It can be configured quickly. Overall, I rate the product an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point NGFW
June 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Network security architect at a energy/utilities company with 10,001+ employees
Good security with great reporting and integration with external solutions
Pros and Cons
- "I like the Next-Generation Firewall."
- "Check Point could improve the time for delivering requested features from customers."
What is our primary use case?
The primary use case is segmentation in many different areas of the company network. We had a few critical use cases: there was a need for an internal firewall, and also an edge firewall. Apart from having simple segmentation, we had a requirement for additional features like the possibility to decrypt traffic, the possibility to inspect URLs or the intrusion prevention system feature.
A very important thing for us was also to have a very good quality of vendor support. Definitely, this is something we can get here.
How has it helped my organization?
With Check Point we have achieved our primary goal - segmentation. We were able to limit North-South and East-West traffic which had a very impressive impact on improving security posture.
We also have the possibility to control Internet traffic, we can use the URL filtering feature together with traffic decryption to be able to allow only safe communication. A very important thing for us is also having the possibility to use identity awareness and be able to implement policy based on user IDs (user ad groups).
What is most valuable?
I like the Next-Generation Firewall. This is the primary feature and use case for this solution. It's a very important thing for us to have a solution that provides ease of use and an intuitive interface.
We are also using other security blades that are included in the package like URL filtering, identity awareness, IPS, antibot, and threat detection.
The most valuable thing for us is to have the possibility to use all the security blades and all security products and have a consistent policy among different security features. Reporting and integration with external solutions are great.
What needs improvement?
Check Point could improve the time for delivering requested features from customers. It could be delivered much faster. Also, communication and status reporting for such requests have a lot of room for improvement. After the request, we do not get any information on the status or progress until it is implemented.
Looking at the trend in the market which aims for vendor consolidation, the strategy to deliver one vendor SASE could be beneficial for Check Point and its customers.
For how long have I used the solution?
I've been familiar with the product since 2003. At my current company, CheckPoint appeared three years ago.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The range of platforms is huge. It can fit every traffic requirement.
How are customer service and support?
Overall I have had a positive experience with support. Sometimes it takes too long to resolve issues, however.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been using Cisco ASA. The switch was done based on the intuitive management interface and ease of use of Check Point.
How was the initial setup?
The setup is straightforward, even if the policies are big and complex.
What about the implementation team?
We have used help from a third-party company.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to prepare their requirements before choosing the product and model.
Which other solutions did I evaluate?
I also evaluated Palo Alto.
What other advice do I have?
It is a really good solution. You should be happy with it if you choose it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Security Consultant at a computer software company with 10,001+ employees
A robust cybersecurity capabilities with significant upgrade downtime
Pros and Cons
- "They utilize various gateway features, including Identity as a Service (IDaaS), anti-spam, antivirus, and other security measures, effectively creating a robust defense against a wide range of potential risks."
- "To enhance the user experience, Check Point should consider adopting an incremental upgrade approach, similar to competitors like Palo Alto or Fortinet, as it would help minimize downtime and streamline the upgrade process, making it more efficient and user-friendly."
What is our primary use case?
The customer's use case involves employing it to safeguard their internal applications from external threats. They utilize various gateway features, including user identity-based policy, anti-spam, antivirus, IPS, anti-BOT, and other security measures, effectively creating a robust defense against a wide range of potential risks.
How has it helped my organization?
The primary focus is on safeguarding the customer's internal applications, especially for traders. When it comes to security, the main advantage lies in risk mitigation, akin to insurance.
What is most valuable?
The most valuable feature is its unique inspection model, which was initially a basic firewall inspection. Over time, they've developed and refined this model to cater specifically to trade-related intelligence. It is now a crucial and central component of their security infrastructure.
What needs improvement?
From an administrative perspective regarding Check Point NGFW, there are two key suggestions to improve efficiency. Firstly, administrators should be able to create a unified policy which means that when administrators set up policies in Check Point, they should have the flexibility to configure different security profiles and other security parameters all within the same access policy, simplifying the process. Secondly, the upgrade process for Check Point Firewalls currently involves extended downtime as it often requires a fresh installation. This downtime can last up to around sixty minutes, causing disruptions to business operations. To enhance the user experience, Check Point should consider adopting an incremental upgrade approach, similar to competitors like Palo Alto or Fortinet, as it would help minimize downtime and streamline the upgrade process, making it more efficient and user-friendly.
For how long have I used the solution?
I have been working with it for about ten years.
What do I think about the stability of the solution?
It provides good stability features. I would rate it six out of ten.
What do I think about the scalability of the solution?
Scalability is achievable in the cloud environment. By following the appropriate processes, you can configure automated scanning and other necessary functions to ensure it.
How are customer service and support?
From a technical support perspective, there is room for improvement in Check Point's services. They have increasingly outsourced a significant portion of their support, primarily to third parties. This outsourcing has raised concerns, as it often results in longer resolution times and troubleshooting processes. In my experience, working with Level 3 engineers is more satisfactory and efficient, whereas Level 1 and Level 2 support can sometimes fall short of expectations and extend the time required to address issues.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
When comparing Check Point to Fortinet and Palo Alto solutions, there are several advantages and disadvantages to consider. One key advantage of Check Point is its robust logging capabilities. Administrators can access detailed traffic flow information, providing valuable insights into network activity. Another strength is the trust associated with Check Point. They pioneered the concept of "stateful firewall," which has established a strong foundation for trust in their security solutions and is built on their extensive experience and history in the field.
How was the initial setup?
The initial setup is a medium-level complexity task.
What about the implementation team?
When deploying on AWS cloud, I typically opt for CloudFormation templates to facilitate the setup of Check Point. This approach offers the advantages of infrastructure as code. When it comes to on-premises deployments, the process is manual and involves tasks such as physical cable connections, configuring interfaces, setting up routes, and defining network policies. For a typical mid-sized project, a single person is usually sufficient for the cloud deployment, taking no more than two hours if the implementation plan is well-defined and the design is in place.
What's my experience with pricing, setup cost, and licensing?
The cost can vary depending on the specific model and feature set requirements, as well as the unique value it offers to the organization. The price may be perceived as relatively high when compared to the features and capabilities they provide.
What other advice do I have?
My advice for anyone considering it would be to begin by thoroughly understanding their specific needs and requirements. It's crucial to assess budget constraints and security priorities. If an organization has a sufficient budget and prioritizes a robust security posture, I would recommend considering Fortinet. They often provide a more comprehensive security exposure when compared to Check Point. For organizations with legacy systems or a strong preference for Check Point's Endpoint solutions, my advice is to segregate the management and gateway components. Avoid running both on the same platform to prevent complexity and potential issues. Separating these functions can lead to a smoother and more efficient operation. Overall, I would rate it six out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Head of IT Department at AS Attīstības finanšu institūcija Altum
Offers great adaptability and a configurable nature
Pros and Cons
- "The solution's most valuable feature is its adaptability and configurable nature."
- "The product's price is an area of concern, making it an area where I would like to see some improvements."
What is our primary use case?
I use the solution in my company for cybersecurity, securing perimeter networks, giving the user access to VPN, URL filtering, antivirus, sandblast, network segmentation, and monitoring purposes.
How has it helped my organization?
Regarding the benefits of using the tool, I would say we spend less time investigating security incidents because we have fewer of them to deal with because Check Point works quite well. The tool offers greater visibility when it comes to network traffic.
What is most valuable?
The solution's most valuable feature is its adaptability and configurable nature. The software's security posture, I would say, has reduced vulnerabilities than other vendors, and we value that greatly in our company.
What needs improvement?
The product's support is an area of concern where improvements are required. Sometimes, there are bugs in the software, and the speed at which the product resolves those bugs could be improved. The system is quite complex, and you need to be an expert to get the most benefits, making it an area where the tool could be improved.
It would be nice if Check Point could update its own agents, for example, VPN clients or identity clients. I think the product has a very large number of features.
The product's price is an area of concern, making it an area where I would like to see some improvements.
For how long have I used the solution?
I have been using Check Point NGFW for a bit less than fifteen years. I use Check Point R81.20.
What do I think about the stability of the solution?
In the past three months, my company has had stability issues, but the impact was quite low, which is great because we have a cluster environment. When one node fails, the other one picks up the job. When changing from version to version, sometimes bugs show up that need to be resolved.
What do I think about the scalability of the solution?
The tool allows you to add as many nodes as you like or can afford. If it is virtualized, you can also give it more resources.
In my company, I think we have four nodes, which are the main nodes, and then we have eight smaller regional nodes. We have around 260 users and 280 endpoints.
How are customer service and support?
I rate the technical support a five or six out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The product's initial setup phase was so long ago that I don't remember how it went. The product is not the most intuitive and easy to set up because of the large number of settings you can configure and the ways how you can configure those settings. Without an expert or consultant, I wouldn't recommend implementing the tool by yourself if you value your time and don't want a big downtime later.
What was our ROI?
The tool's ROI is almost impossible to calculate because it's a security product. If nothing happens, then you always feel like you are paying too much, but you don't know how the situation would change if you use cheaper firewalls and have to face a security breach.
What's my experience with pricing, setup cost, and licensing?
The product's price is on the higher side but I also feel that it is more secure than the other solutions in the market.
Which other solutions did I evaluate?
In the past, my company had tested Fortinet and Sophos, but we did not migrate to them. Though the price of the firewalls from Fortinet and Sophos were better, from a security perspective, Check Point was better. In the recent years, there have been a lot of critical vulnerabilities detected in those firewalls and breaches because those vulnerabilities were detected and we didn't get them. So we value that greatly.
What other advice do I have?
The tool requires maintenance. You need to update the product version. If we don't encounter any bugs in the installation process, I would say that the maintenance process is quite straightforward.
I recommend the tool to others. If you value your data and it is a mission-critical project, then Check Point is the right choice.
I rate the tool an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer at a comms service provider with 51-200 employees
Offers a vital anti-spoofing feature but needs to upgrade the IPSec VPN port
Pros and Cons
- "The spoofing prevention feature is the most valuable feature."
- "Needs to upgrade the IPSec VPN port"
What is our primary use case?
The solution is used to provide firewall security to cloud integrations.
What is most valuable?
The spoofing prevention feature is the most valuable feature.
What needs improvement?
The solution provider needs to upgrade the IPSec VPN port because VPN branch-to-branch configuration can be easily implemented at our company, but several difficulties arise in a cloud environment like AWS or Azure cloud. The aforementioned cloud providers often need to create VPN interfaces, but in a few cases, these teams don't have the knowledge for configuration or IP points; their knowledge remains limited to the architecture of the clouds on a networking level.
In future releases of the solution, a remote access VPN feature should be added. Our organization expects the aforementioned feature because we have a secure validated configuration in our remote access VPN, and the feature would allow easy configuration.
For instance, if a customer wants to connect a VPN to a particular domain laptop, our company can integrate the domains with our network's remote access VPN, but the user is unable to connect with other personal laptops.
For how long have I used the solution?
I have been using Check Point NGFW for five years.
What do I think about the stability of the solution?
I would rate the stability of the solution as seven out of ten. The tech support is not operational sometimes, and in a few cases, the tech team of the vendor is unable to provide support with a proper explanation or resolution. Check Point NGFW fails to provide workarounds for certain issues and thus leads to huge time consumption for a single task. The support team of Check Point NGFW on a few occasions takes five to ten hours to resolve an urgent VPN issue which impacts the stability.
At our company, if we raise an RMA for Check Point NGFW, it takes immense time, which is around 15 to 30 days, to obtain the box, whereas other vendors offer it within five to seven business days. Due to the aforementioned issue, our organization needs to implement a test device on the environment and purchase temporary licenses for that device so that the customers in a stand-alone environment can access the internet.
In Check Point NGFW, sometimes the logs consume excess storage, and even the storing or indexing process is not implemented correctly.
What do I think about the scalability of the solution?
I would rate the scalability a seven out of ten.
How are customer service and support?
Support is available for Check Point NGFW, but the support team, in most cases, is unable to provide an effective and on-time solution after collecting logs. I would rate tech support a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I worked with Palo Alto previously before transferring to Check Point NGFW. I wanted to learn about Check Point NGFW in-depth as it's considered a difficult solution compared to others, so I ventured into it.
How was the initial setup?
In our company, we have the option for both cloud-based and on-prem deployment of the solution. The management server integration is different for the aforementioned options. If the traditional management server is present locally, in that case, at our company, we are using the solution for integration, but if a cloud is involved, some keys need to be integrated with the cloud management to let the firewall have internet access.
Almost every time when the management server reaches or expands to another country in our organization, we face difficulty with integrations. The deployment time of Check Point NGFW depends upon customer requirements, but it takes approximately 15 to 30 days. More feature integrations demand the involvement of more teams in the deployment process. In my area of business, about 50 to 70 customers are using Check Point NGFW.
If the solution is in a cluster environment, a maintenance window is not required and most of our customers are using the solution in a clustering or stand-alone mode.
What's my experience with pricing, setup cost, and licensing?
It's an expensive solution.
What other advice do I have?
Most of our organization's customers are using Check Point NGFW for networks, as enhancing the firewall's performance is not required; if the firewall goes inactive, total protection decreases. Our organization's customers don't want to depend on any particular product and are thus investing in multiple security products.
On a few occasions, integrating a RADIUS configuration with Check Point NGFW has been difficult because some versions are not supported. I have also faced trouble regarding authentication when integrating Check Point NGFW with Azure EAD.
Recently, Check Point NGFW has been integrated with zero-threat AI security features. In our organization, we are installing the solution on the Blade architecture, where the aforementioned features function well enough. I would recommend Check Point NGFW to others. I would rate Check Point NGFW overall a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Network Security Engineer at DMS Electronics (Pvt) Ltd
Offers features like WatchTower that helps you manage the device using a mobile and stable product
Pros and Cons
- "The IPS protection is the most useful feature that I found from Check Point."
- "The setup is a little complex compared to its competitors."
What is our primary use case?
Primarily, it's used for customers who want to add their network security.
What is most valuable?
The IPS protection is the most useful feature that I found from Check Point. It has a feature called WatchTower, which helps you manage the device using a mobile. That's the most used feature.
Other than that, it's quite simple. All the other features are what you find in all other firewalls. So the best feature that I find from Check Point is WatchTower.
What needs improvement?
The setup is a little complex compared to its competitors. That's what makes it stand out. Other than that, it could always be done by another product, but they have a lot of IoT products. This is definitely something like a Check Point Quantum device.
For how long have I used the solution?
I have been using it for two years. The version I use is R8x series. I'm not exactly sure, but it's the latest version.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
The customer service and support have been good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Sophos XG. We (my company) still use Sophos, Check Point, and FortiGate. We use all three firewalls in our environment.
Check Point has a really good feature where they give us a subscription for IoT device protection, which other vendors don't have. Sophos, I don't think they have it.
Fortinet charges for it separately, so that's an additional cost, but with Check Point, the feature is built in. It's not an additional license.
Moreover, Check Point has started promoting a lot. It's well known here in our region.
How was the initial setup?
The initial setup is complex. It's pretty easy to maintain.
We deployed it for customers. So maybe if we do a big deployment, it could be difficult.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable compared to the features that you get.
What other advice do I have?
I highly recommend it to users who have a lot of IoT devices.
It all comes down to one simple thing:
"If you have IoT devices, I highly recommend Check Point NGFW. If you don't, it's a bit complex compared to Fortinet and Sophos."
But once you get the hang of it, you can quite easily configure the device.
Moreover, Check Point has a certification program if you want, and you can learn with that. They also have a separate certification program that you can take, a paid certification program.
I am satisfied with the documentation by Check Point.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Presales IT solutions at ICCO
Monitors traffic well, is user-friendly and offers a good dashboard
Pros and Cons
- "The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events."
- "Timely updates to security databases, firmware, and software are crucial for addressing new threats."
What is our primary use case?
We are using the product in a small office to secure our network to configure the firewall settings to control incoming and outgoing traffic.
This includes setting up rules for allowing or blocking specific types of traffic.
We use intrusion prevention features to detect and prevent potential threats and attacks on your network.
It enables logging and monitoring features to keep track of network activity and identify potential security incidents.
With the solution, we can implement strong user authentication mechanisms to control access to your network resources.
How has it helped my organization?
The use of Check Point NGFW makes our business feel safer.
NGFWs typically include advanced threat prevention mechanisms, such as intrusion prevention systems (IPS), antivirus, anti-malware, and threat intelligence. These features help protect your network from a wide range of cyber threats.
NGFWs can integrate with user identity management systems, enabling more granular control over network access based on user identities. This is particularly important for enforcing security policies on a per-user basis.
What is most valuable?
The interface is user-friendly, and also they give you small training courses on the Coursera website to explain how to use the products.
The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events. This helps administrators get a snapshot of the network's security posture.
The ability to monitor network traffic and security events in real time is crucial. Check Point's interface often provides real-time visibility into network activity, making it easier to identify potential issues or threats.
What needs improvement?
Their products are pretty complete, and the explanations are very well done.
Check Point offers training and certification programs for administrators and security professionals. These programs help individuals develop the skills needed to effectively manage and secure networks using Check Point products.
Timely updates to security databases, firmware, and software are crucial for addressing new threats. Check Point's commitment to providing ongoing support ensures that organizations have access to assistance when needed.
For how long have I used the solution?
We have been using this solution for the last two years already.
What do I think about the stability of the solution?
The solution we use is pretty complete. For the moment, the stability is good enough for us.
What do I think about the scalability of the solution?
CkeckPoint has solutions for different sizes of companies. Therefore, the solution is scalable. The client has to choose the right solution for their needs. If you call the contact center, they can advise you on your options.
How are customer service and support?
We have not used technical support, up until now we haven't needed them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a normal antivirus on the endpoints previously. However, after we took a cybersecurity course, we understood that a bigger security solution was needed.
How was the initial setup?
The initial setup is easy. You just click through, next, next, next, and take some steps to make an account and do some basic setups. Everything basically works out of the box.
What about the implementation team?
We implemented the solution through a vendor team; they had well-trained technicians.
What was our ROI?
To feel safer in the online environment is the most important thing these days. Everything is online now. A solution like that makes it easier and safer for you to work and do things online.
What's my experience with pricing, setup cost, and licensing?
After researching what's available in the market, choose a product. Read reviews and watch demos to assess the user interface and learn what options the product offers.
Which other solutions did I evaluate?
We searched the market for months before we chose Check Point. There are many security solutions on the market, both for on-premises and on the cloud. We chose Check Point for the ease of use.
What other advice do I have?
The solution is perfect for us. That said, for each client, the needs are different.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Meraki MX
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?