It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades. Its integration with a web application firewall provides added protection.
Technical Architect and consultant at a aerospace/defense firm with 10,001+ employees
Enhances network security and ensures robust scalability capabilities
Pros and Cons
- "It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades."
- "There is a strong demand for security services that can be effortlessly integrated which would ensure that security measures can seamlessly adapt to the cloud infrastructure."
What is our primary use case?
What is most valuable?
Check Point's architecture is three-fold, comprising the firewall, management server, and dashboard. The dashboard provides a comprehensive view of the network and security status, enabling identification and isolation of problematic devices, performing tasks like patch updates, and monitoring logs. It provides configured automated alerts via email or notifications on mobile devices, ensuring you're informed of any threats, even during non-business hours. Another vital function is the ability to offer VPN services. This enables end users and mobile or remote workers to securely access the network from anywhere globally.
What needs improvement?
There is a strong demand for security services that can be effortlessly integrated which would ensure that security measures can seamlessly adapt to the cloud infrastructure.
For how long have I used the solution?
I have been working with it for eight years.
Buyer's Guide
Check Point Quantum Force (NGFW)
February 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is a highly reliable tool. I would rate its stability capabilities nine out of ten.
What do I think about the scalability of the solution?
Check Point NGFW is a highly scalable solution that can be tailored to the unique needs and infrastructure of each customer. For instance, if a customer needs to secure multiple zones, they can opt for multiple firewalls. They can consolidate their network onto a single firewall by creating virtual interfaces based on VLANs. The firewall's capability to handle network traffic becomes a crucial consideration, especially when dealing with larger user bases and higher traffic volumes. In such cases, deploying multiple firewalls in a high-availability configuration becomes essential.
How was the initial setup?
The initial setup was easy. I would rate it nine out of ten.
What about the implementation team?
I have hands-on experience working in various environments, including on-premises, private clouds, hybrid setups that combine both private and public clouds (e.g., AWS, Google Cloud, Oracle Cloud), and purely public cloud deployments. While the technical interfaces and options may differ slightly between these environments, the core concepts, such as Security Event and Management (SEM), remain consistent. For instance, the Virtual Private Cloud (VPC) configurations in Google Cloud are similar to those in AWS. Network components like instances and Access Control Lists (ACLs) share common principles across platforms. The key to successfully implementing it lies in understanding the specific needs of each client's business and aligning our solutions accordingly. We can leverage technology and services to meet their requirements effectively. It's worth emphasizing that the adaptability of our approach is central to achieving our clients' objectives. When starting a project, we typically initiate a POC and conduct thorough pre-checks to assess the network's specific needs. In cases where clients want to transition from legacy firewalls like Cisco ASA or Palo Alto to modern Next-Generation Firewalls like Check Point Firewall, we carefully examine their existing configurations. This allows us to manipulate and adapt the configurations to suit Check Point's requirements. The timeline for these processes can vary. For entirely new environments, which involve documentation, design, and diagram creation, it may take anywhere from 15 days to one month at most.
What's my experience with pricing, setup cost, and licensing?
The pricing falls in the middle, meaning it's neither cheap nor expensive. I would rate it five out of ten.
What other advice do I have?
Before opting for this solution, it is crucial to assess the customer's existing environment, including the number of users, traffic patterns, applications in use, and bandwidth utilization. It is an excellent choice and I would encourage others to consider using it for their security needs. I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner, Post and pre services
Director, IT Infrastructure Management Department at a financial services firm with 1,001-5,000 employees
Robust control and security that enables a comprehensive application management
Pros and Cons
- "We can precisely determine who has access rights and who is granted permission, regardless of their connection point."
- "Improvement regarding the expansion of the SMS's compatibility to include various virtualization environments would be beneficial."
What is our primary use case?
We use Check Point Next-Generation Firewall as a perimeter firewall. This means that all incoming and outgoing traffic from our premises is routed through the Check Point firewall. Within our configuration, we have activated several security features and licenses, including the firewall itself, site-to-site VPN functionality, application and URL filtering, Identity Awareness, threat simulation, and anti-bot protection. Additionally, we possess the license for the NGpX version, which includes extraction capabilities.
How has it helped my organization?
With our previous firewall solution from a different vendor, we were limited to basic firewall functionality without features like IPS and content filtering. With the implementation of Check Point firewall, we got a comprehensive set of features that enables us to gain clear visibility into how our applications behave and which areas we have control over. It allows us to monitor and manage application usage effectively while allowing us to filter and enforce rules in accordance with our organization's security policies.
What is most valuable?
The most invaluable features we have are content filtering and application control. These features operate seamlessly, thanks to the integration of Identity Awareness. Through Identity Awareness, we established a connection with our internal LDAP server, which enables us to exercise complete control over user access. We can precisely determine who has access rights and who is granted permission, regardless of their connection point.
What needs improvement?
We implemented our firewall in a clustered configuration with two gateways. We faced some limitations with the Security Management Server (SMS) application. The SMS functionality is restricted as it only supports specific deployment modes on virtualization environments like Microsoft Hyper-V and VMware ESX and Open Server mode. Our organization utilizes a different virtualization setup, and we couldn't obtain assurance from the vendor that they would provide support if we deviated from their recommended deployment methods. That is why we had to deploy the SMS on a separate server, which introduced additional complexity. Improvement regarding the expansion of the SMS's compatibility to include various virtualization environments would be beneficial. Also, when attempting to enable SSL offloading mode, we faced functionality issues. This feature should be enhanced to ensure seamless SSL offloading, without negatively impacting the core functionalities such as HTTPS and content filtering.
For how long have I used the solution?
I have been working with it for more than three years.
What do I think about the stability of the solution?
Its stability capabilities are impressive. We have not encountered any issues. I would rate it nine out of ten.
What do I think about the scalability of the solution?
The scalability is relatively good, especially when considering its database capabilities. Our physical gateway hardware can comfortably handle up to nine units. When it comes to the monitoring appliance, such as the Check Point SMS (Security Management Server), it requires substantial resources. Due to limitations with supported virtual environments, we encountered challenges in expanding its capacity. I would rate its scalability 6 out of 10 since there is room for improvement in this area.
How are customer service and support?
We chose the Pro Support option, which has allowed us to automate many of the Security as a Service (SaaS) functions. This means that whenever there's an error in the gateways' flow, an SR (Service Request) is automatically generated and promptly communicated. The support provided has been exceptionally efficient, with quick and responsive assistance. I would rate it nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used the Cisco ASA 5525X version, but we found that its management and performance capabilities were distinct. Cisco retired some of its features, and the replacement version offered came at a higher cost for the features it provided. Consequently, we decided to transition to Check Point, which offered us a more favorable price point without compromising on functionality.
How was the initial setup?
The initial setup was easy. I would rate it eight out of ten.
What about the implementation team?
The deployment process took approximately a week and a half, and about half of the challenges we faced were related to the physical connectivity issues on our end. Despite those hurdles, the deployment timeline remained relatively swift. One critical aspect for anyone planning to deploy this solution is to thoroughly understand where it fits within the network architecture and how it should be physically connected. This is especially important when implementing clustering, as the physical connectivity can become intricate. It's essential to consider high availability and compatibility with other devices it will connect to, such as core switches or perimeter routers. Ensuring that these devices support the desired failover and reliability modes is key to avoiding complications. The duration of the deployment also depends on the expertise of the person responsible for it. In our case, we opted for professional services, which included on-site configuration support. If the person handling the deployment is familiar with the surrounding devices and network environment, one individual may suffice. If there are connections to devices from different vendors, and the configuring expert lacks expertise in those areas, I would advise involving additional personnel with the relevant expertise to ensure a smooth deployment process.
What's my experience with pricing, setup cost, and licensing?
It may be considered relatively expensive, but the investment is justified when compared to other competitors. Check Point's functionality and capabilities are notably strong. The cost of licensing can vary based on the prevailing exchange rates. In our case, we paid for the renewal in our local currency, but on average, it amounts to approximately $32,000 USD annually. I would rate it eight out of ten.
What other advice do I have?
It is highly commendable for its stability and performance. When deciding on the appropriate licensing option, it's important to carefully consider your needs. Opting for two-year or five-year licenses can provide cost savings through discounts. After it is deployed, those with experience using other next-generation firewalls will find it relatively straightforward to manage. It doesn't require significant additional effort, and users with a basic understanding of next-generation firewall features can navigate through the management and rule settings easily. I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
February 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
Senior Client Executive at a tech vendor with 10,001+ employees
Powerful firewall for advanced security with robust support
Pros and Cons
- "Check Point's support is probably the best of the major players in that space."
- "Check Point's capabilities are limited from a firewall perspective."
What is our primary use case?
I do not use them, I just sell them, but customers are using them to protect on the edge and at the core.
What is most valuable?
It brings value to their clients as everybody is concerned with security. Firewalls are the first line of defense. Check Point's support is probably the best of the major players in that space. Check Point is more complex than the other players, but it is also more powerful.
What needs improvement?
A lot of the other players have a more robust best-of-suite offering versus the best-of-breed offering. Check Point's capabilities are limited from a firewall perspective. Other players are acquiring companies and offering add-ons like CASB or VPN-type capabilities.
For how long have I used the solution?
I have had experience with Check Point Next Generation Firewall for seven or eight years.
What do I think about the stability of the solution?
Their code is a little bit finicky as of late, but that's just because they just released this product line.
What do I think about the scalability of the solution?
It depends on what you're deploying. Maestro is more scalable than standalone firewalls.
How are customer service and support?
The support depends on what support model you buy. Customers that have dedicated support teams get more attention than the traditional support, however, a lot of other companies are offshoring their support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Cisco is not a true security company, but Check Point is where they grew up, so I think they are a little more mature.
How was the initial setup?
The initial setup depends on the environment and can take weeks. It is not different than the rest of the players in terms of maintenance.
What about the implementation team?
It's basic engineers, usually one to two people.
What was our ROI?
It is pretty difficult to determine ROI with firewalls because they are more of an insurance policy. However, it helps with security. The cost of a breach versus having some of these measures in place is the real comparison.
What's my experience with pricing, setup cost, and licensing?
There is a lot of price parity between all the players. Everybody is within plus or minus ten percent. Check Point is probably more expensive than some of the other players out there, but it is incremental.
Which other solutions did I evaluate?
I evaluated Palo Alto and Fortinet.
What other advice do I have?
I would recommend Check Point Next Generation Firewall to others. I would put them in the upper echelon.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Security Analyst at a consultancy with 10,001+ employees
A robust solution that can handle heavy workloads and user traffic well
Pros and Cons
- "The solution is robust and can handle heavy workloads and user traffic well. The product is good."
- "The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN."
What is our primary use case?
We use Check Point NGFW as our data center and branch location firewalls.
What is most valuable?
The solution is robust and can handle heavy workloads and user traffic well. The product is good.
What needs improvement?
The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN.
For how long have I used the solution?
I have been working with the product for ten years.
What do I think about the stability of the solution?
I rate the product's stability an eight out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability an eight out of ten. My company has 5000 users.
How was the initial setup?
The initial setup can be complex, especially for BGP configurations. I'd rate it a five out of ten for ease of setup. It's neither too hard nor too easy - it depends on your requirements. We deployed it on-premises. The initial deployment of our enterprise-grade device took about three months. We need about two people for maintenance, mainly for operational changes when needed.
What about the implementation team?
We mostly did the deployment ourselves, with some professional services support from Check Point. Three to four people were involved in the deployment, including one from Check Point to validate our work.
What other advice do I have?
The Harmony bundle is interesting, with many new features, but we're not evaluating it much as we're moving to FortiGate. We're not planning to increase the usage of Check Point NGFW. We're looking into SD-WAN and moving towards FortiGate.
I rate the overall solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Defense protection study manager at a government with 10,001+ employees
Reliable platform providing ease of management
Pros and Cons
- "The interface allows us to quickly adapt to new security requirements and maintain compliance with organizational policies."
- "The platform's technical support services need enhancement."
What is our primary use case?
We primarily use Check Point NGFW for network segmentation and traffic control. It effectively segments our network into zones, allowing us to manage and secure traffic flows between different segments.
What needs improvement?
The platform's technical support services need enhancement.
What do I think about the scalability of the solution?
The product is highly scalable and crucial for our large-scale deployment needs. Its scalability is a ten out of ten.
How are customer service and support?
The technical support is generally responsive, although there have been occasional delays in accessing specialized assistance tailored to our needs.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was handled by dedicated experts within our organization, ensuring a smooth setup. While I didn't oversee the technical aspects directly, our team found the process straightforward, minimizing operational disruptions.
What was our ROI?
The product is on the higher end of the cost spectrum, but the investment is justified by its high-quality performance and reliability, which are paramount for our security infrastructure.
What other advice do I have?
Check Point NGFW has consistently provided stable operation which is critical for our organization's security needs.
Managing firewall rules and policies is intuitive and efficient. The interface allows us to quickly adapt to new security requirements and maintain compliance with organizational policies.
I highly recommend it for organizations seeking robust network security.
Overall, I rate it an eight.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer at a tech services company with 201-500 employees
Offers features like WatchTower that helps you manage the device using a mobile and stable product
Pros and Cons
- "The IPS protection is the most useful feature that I found from Check Point."
- "The setup is a little complex compared to its competitors."
What is our primary use case?
Primarily, it's used for customers who want to add their network security.
What is most valuable?
The IPS protection is the most useful feature that I found from Check Point. It has a feature called WatchTower, which helps you manage the device using a mobile. That's the most used feature.
Other than that, it's quite simple. All the other features are what you find in all other firewalls. So the best feature that I find from Check Point is WatchTower.
What needs improvement?
The setup is a little complex compared to its competitors. That's what makes it stand out. Other than that, it could always be done by another product, but they have a lot of IoT products. This is definitely something like a Check Point Quantum device.
For how long have I used the solution?
I have been using it for two years. The version I use is R8x series. I'm not exactly sure, but it's the latest version.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
The customer service and support have been good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Sophos XG. We (my company) still use Sophos, Check Point, and FortiGate. We use all three firewalls in our environment.
Check Point has a really good feature where they give us a subscription for IoT device protection, which other vendors don't have. Sophos, I don't think they have it.
Fortinet charges for it separately, so that's an additional cost, but with Check Point, the feature is built in. It's not an additional license.
Moreover, Check Point has started promoting a lot. It's well known here in our region.
How was the initial setup?
The initial setup is complex. It's pretty easy to maintain.
We deployed it for customers. So maybe if we do a big deployment, it could be difficult.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable compared to the features that you get.
What other advice do I have?
I highly recommend it to users who have a lot of IoT devices.
It all comes down to one simple thing:
"If you have IoT devices, I highly recommend Check Point NGFW. If you don't, it's a bit complex compared to Fortinet and Sophos."
But once you get the hang of it, you can quite easily configure the device.
Moreover, Check Point has a certification program if you want, and you can learn with that. They also have a separate certification program that you can take, a paid certification program.
I am satisfied with the documentation by Check Point.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Managing Director at a manufacturing company with 10,001+ employees
Robust network protection with advanced threat prevention, comprehensive multi-layered security, and seamless stability
Pros and Cons
- "It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats."
- "There is room for enhancement in the support system in India."
What is our primary use case?
We use it for safeguarding our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios. Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.
What is most valuable?
It provides a comprehensive and scalable security solution. With features like nanosecurity, cloud integration, and multi-domain management, they address the diverse security needs of businesses, from small enterprises to large corporations. It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats. It boasts an Infinity architecture, offering a multitude of features tailored to enterprise needs. The integration with AWS and Google Cloud, safeguarding cloud servers and networks. The Multi-Domain Management feature enables centralized control across on-premises and cloud environments, streamlining security management.
What needs improvement?
There is room for enhancement in the support system in India. Given the burgeoning market and the growing reliance on security solutions, focusing on strengthening support and implementation infrastructure would be beneficial. This could involve increased training programs to equip professionals with the necessary skills to understand and effectively implement Check Point technologies. Its scalability capabilities should be improved.
What do I think about the stability of the solution?
It's an exceptionally stable tool. I would rate it nine out of ten.
What do I think about the scalability of the solution?
Scaling up is quite restricted, and the scalability needs improvement. It should be a multi-tiered and robust solution. Currently, there is a gap in the ability to seamlessly scale within the same series. I would rate it seven out of ten.
How are customer service and support?
Technical support in India is lacking, and there's a clear need for improvement. There's a high reliance on third-party support, which needs to be addressed. The current rating would be around five on a scale of one to ten.
How would you rate customer service and support?
Neutral
What about the implementation team?
The implementation process is generally straightforward and basic, taking around one to one and a half hours. However, if there's a need for the creation of numerous VLANs and policies, it might extend over several days.
What's my experience with pricing, setup cost, and licensing?
It comes with a significant price. The cost of the six thousand six hundred models was approximately thirty-eight lakhs. Although the cost may be higher, the reliability and functionality it offers are well worth the investment. I would rate it ten out of ten.
What other advice do I have?
I consider it a top leader in security, and I highly recommend it. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Senior Technical Consultant at a tech consulting company with 10,001+ employees
Improves environments, has helpful support, and offer great compute power
Pros and Cons
- "The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware."
- "We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration."
What is our primary use case?
The customer purchased Check Point 6200 Firewalls to replace their aging Cisco ASA firewalls on the perimeter of their sites. The Cisco Firewalls must be replaced due to insufficient capacity.
It is envisioned that the initial migration will be a direct replica of the ASA configuration, with the client expanding the solution post-migration, with Check Point NGFW features.
This project consisted of the following deliverables:
• Rule base is migrated like for like, in which ASA Firewall zone-based rules will be converted to Check Point Parent/Child layered rules.
• Firewall zones to be imported and reviewed post migration by client.
• NAT rules will be migrated “as-is”.
• Geo-location rules from FTD will be honored and mapped into Check Point.
• Client-based blacklisting will be migrated into the solution, using external feeds via URL.
• A single IPS profile consisting of a clone of the vendor's “out-of-box” balanced profile (optimized).
• 1X site-to-site VPN.
• Integration into Client’s Cisco ISE solution for RADIUS-based admin authentication.
• NGFW licensing and blades to be installed on firewall devices, to allow features to be enabled in the future and expand the solution.
How has it helped my organization?
The Client wishes for the ASA firewalls to be replaced with a Check Point systems solution, which consists of 6200 Plus Appliances.
The initial requirement was to migrate the configuration in an “as-is” state, with the necessary licensing purchased and installed to enable expansion of the solution with next-generation feature sets in the future.
The solution was able to meet and exceed the client's requirements thereby improving the client's environment.
The management server is software-based.
Firewalls and licensing include:
• FW
• IPS
The solution provides a single pane of glass management of rules/logging.
The solution supports IPsec tunnels FOR 1X IPsec VPNs.
The solution integrates with the client’s Cisco ISE RADIUS solution for administrative access.
What is most valuable?
The compute power of the appliance is great. The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware.
What needs improvement?
We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration.
Check Point configuration options can be very enormous and overwhelming.
Check Point comes with a very lean learning curve even though they offer a robust knowledge base.
A lot of configuration cannot be accomplished via the web interface or the smart dashboard software and must be done manually via the command line interface.
I'd like to see some built-in automation for the firewall alerts/events to trigger an automated response or recovery.
For how long have I used the solution?
I've used the solution for three years.
What do I think about the stability of the solution?
The solution is stable with frequent version and management updates.
What do I think about the scalability of the solution?
The solution is highly scalable and expandable.
How are customer service and support?
The solution offers great customer support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a different solution and needed more processing power and functionality which this had compared to industry competitors.
How was the initial setup?
The setup was straightforward yet third-party device migration contained a lot of manual configuration conversions.
What about the implementation team?
I implemented this myself.
What's my experience with pricing, setup cost, and licensing?
Pricing can be relatively more expensive when compared to industry peers, however, the functionality makes up for the price difference.
Which other solutions did I evaluate?
We also evaluated:
- Cisco NGFW
- Fortigate NGFW
- Palo Alto NGFW
What other advice do I have?
This is a great overall solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Check point Partner
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
Check Point CloudGuard Network Security
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
















