We use it for safeguarding our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios. Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.
Managing Director at a manufacturing company with 10,001+ employees
Robust network protection with advanced threat prevention, comprehensive multi-layered security, and seamless stability
Pros and Cons
- "It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats."
- "There is room for enhancement in the support system in India."
What is our primary use case?
What is most valuable?
It provides a comprehensive and scalable security solution. With features like nanosecurity, cloud integration, and multi-domain management, they address the diverse security needs of businesses, from small enterprises to large corporations. It excels in malware prevention, utilizing features like fan black pattern and vulnerability-driven detection, ensuring comprehensive security against evolving threats. It boasts an Infinity architecture, offering a multitude of features tailored to enterprise needs. The integration with AWS and Google Cloud, safeguarding cloud servers and networks. The Multi-Domain Management feature enables centralized control across on-premises and cloud environments, streamlining security management.
What needs improvement?
There is room for enhancement in the support system in India. Given the burgeoning market and the growing reliance on security solutions, focusing on strengthening support and implementation infrastructure would be beneficial. This could involve increased training programs to equip professionals with the necessary skills to understand and effectively implement Check Point technologies. Its scalability capabilities should be improved.
What do I think about the stability of the solution?
It's an exceptionally stable tool. I would rate it nine out of ten.
Buyer's Guide
Check Point Quantum Force (NGFW)
January 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the scalability of the solution?
Scaling up is quite restricted, and the scalability needs improvement. It should be a multi-tiered and robust solution. Currently, there is a gap in the ability to seamlessly scale within the same series. I would rate it seven out of ten.
How are customer service and support?
Technical support in India is lacking, and there's a clear need for improvement. There's a high reliance on third-party support, which needs to be addressed. The current rating would be around five on a scale of one to ten.
How would you rate customer service and support?
Neutral
What about the implementation team?
The implementation process is generally straightforward and basic, taking around one to one and a half hours. However, if there's a need for the creation of numerous VLANs and policies, it might extend over several days.
What's my experience with pricing, setup cost, and licensing?
It comes with a significant price. The cost of the six thousand six hundred models was approximately thirty-eight lakhs. Although the cost may be higher, the reliability and functionality it offers are well worth the investment. I would rate it ten out of ten.
What other advice do I have?
I consider it a top leader in security, and I highly recommend it. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Network Engineer at a tech services company with 10,001+ employees
Intuitive with a user-friendly management interface and is accessible to non-technical staff
Pros and Cons
- "Check Point firewalls have significantly improved our ability to detect and prevent threats."
- "It requires enhanced automation tools for regulatory compliance to ease the burden of compliance reporting and auditing."
What is our primary use case?
The implementation of Check Point firewalls has been a transformative experience for our organization. It has significantly improved our cybersecurity posture, enabling us to detect and prevent threats more effectively, streamline management, and stay agile in the face of evolving security challenges.
With Check Point, we are not just securing our data, we are also protecting our brand and reputation. The value they bring to our organization is immeasurable, making them an essential component of our overall cybersecurity strategy.
How has it helped my organization?
In today's ever-evolving digital landscape, cybersecurity is paramount for any organization. For our company, the implementation of Check Point firewalls has proven to be a pivotal moment in our ongoing quest to bolster our cybersecurity defenses. These firewalls have not only improved our security measures but have also positively impacted our overall business operations.
In our industry, adhering to stringent compliance regulations is paramount. Check Point firewalls help us ensure compliance with industry-specific regulations and standards, such as HIPAA, GDPR, or PCI DSS. This compliance assurance has eased the audit process and instilled trust among our clients.
What is most valuable?
Check Point firewalls have significantly improved our ability to detect and prevent threats. The robust threat intelligence capabilities, coupled with real-time monitoring, have allowed us to swiftly respond to potential security breaches. As a result, we have experienced a noticeable decrease in security incidents and data breaches, which ultimately translates into cost savings and a bolstered reputation.
As our organization grows, so does the volume of data we need to protect. Check Point firewalls have proved scalable and can handle increased traffic and the addition of new services without compromising performance. This scalability ensures that our security measures are always aligned with our business growth.
One of the standout features of Check Point firewalls is their user-friendly management interface. This intuitive platform has streamlined firewall management, making it accessible to both our in-house IT team and non-technical staff. This has resulted in a more efficient use of resources and time, allowing our IT personnel to focus on other critical tasks.
What needs improvement?
The product needs comprehensive reporting and analytics capabilities to help organizations gain insights into their security posture and demonstrate compliance to stakeholders.
It requires enhanced automation tools for regulatory compliance to ease the burden of compliance reporting and auditing.
The solution needs to tighten security by facilitating easy integration with MFA solutions to enhance user authentication.
It needs to integrate automation and orchestration capabilities to streamline incident response and automate routine security tasks, reducing the workload on security teams.
As containerization and microservices become more prevalent, it needs to provide security solutions that protect these modern application architectures effectively. Features like runtime protection and security scanning for containers can be beneficial.
For how long have I used the solution?
I've used the solution for almost five years now.
What do I think about the stability of the solution?
Check Point firewalls are quite robust and resilient.
What do I think about the scalability of the solution?
Check Point firewalls have proved scalable and can handle increased traffic and the addition of new services without compromising performance.
How are customer service and support?
The technical support is recommended. I'd give them an A++++.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
We deployed the solution using Check Point's PS Support. Their team is highly experienced and professional.
What was our ROI?
It's worth the cost.
What's my experience with pricing, setup cost, and licensing?
Initially, the cost of the investment might seem high compared to other vendors. However, in the long run, it might prove to be economical and cost-efficient.
Which other solutions did I evaluate?
I also evaluated Fortinet and Cisco ASA.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
January 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Network Security Architect at a consultancy with 10,001+ employees
A highly stable solution that provides security and has firmware with very few vulnerabilities
Pros and Cons
- "The tool has solid firmware with very few vulnerabilities."
- "The tool must improve its support."
What is our primary use case?
The solution is our main firewall. It protects our perimeter.
What is most valuable?
The tool has solid firmware with very few vulnerabilities. We don't need to upgrade it for vulnerabilities. It is rare when compared to the competitors. The product’s performance is good. My organization chose the product because it is stable and provides a very good Software Blade.
What needs improvement?
The tool must improve its support. The support provided by partners gets expensive.
For how long have I used the solution?
I have been using the solution for around six years.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
The solution protects the entire perimeter. Every user passes through the firewall. It is used daily. We have around eight administrators. The solution requires very little maintenance.
How was the initial setup?
The initial setup was easy.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive. A medium data center would cost around $17,000 per year for a medium enterprise.
Which other solutions did I evaluate?
Except for Palo Alto, Check Point is good compared to its competitors. Cisco ASA lacks features.
What other advice do I have?
It is a good product. There are other competitors. Check Point NGFW is easy to deploy, manage, implement, and troubleshoot. The operation is pretty simple. Even a few operations people can run it very well. It is pretty much stable. We need to safeguard the data of our organization very well. Check Point NGFW is a leading solution provider. Security products must not have many vulnerabilities. Overall, I rate the product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
It's easy to set rules and policies, which has greatly simplified cleanup and management.
Pros and Cons
- "Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic."
- "Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade."
What is our primary use case?
We're using Check Point NGFW for network security, intrusion detection, intrusion prevention, application control, DDoS attack protection, sandblast, mobile device management, identity-based access control, reporting, access control policy, scalability, state-of-the-art security gateway, support, threat prevention, accelerated policy installation, concurrent security policy installation, advanced routing, easy upgrading, logging and monitoring, smart events, and smart console.
How has it helped my organization?
Check Point has improved our organization's security posture, especially the IBAC, application control, IPS, and IDS. It's easy to set policies on the firewall, which has greatly simplified cleanup and management.
We recently upgraded from R80.10 to R40, and we've had an overwhelmingly positive experience with this version. Our visibility of threats and vulnerabilities has improved. Check Point added new features and revamped its reporting and analysis.
What is most valuable?
Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic.
What needs improvement?
Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade.
I would also like it if Check Point cut the number of steps needed to upgrade from R77 to R81. They should also make it possible to convert access control policies from the firewall to the management server and to downgrade from a higher version to a lower one.
For how long have I used the solution?
I've been using Check Point NGFW for six years.
What do I think about the stability of the solution?
The solution has been stable, and Check Point promptly delivers patches and updates.
How are customer service and support?
I rate Check Point support nine out of 10. When we need help, they're always fast and efficient. Check Point's customer service is one of the major reasons we've stuck with this solution.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We adopted Check Point because of the cost and support.
How was the initial setup?
If you have the right training, you can set up Check Point with minimal supervision.
What's my experience with pricing, setup cost, and licensing?
Before you buy, check which features you need, and if possible, I recommend signing up for at least a three-year license.
Which other solutions did I evaluate?
We considered several vendors, including Fortinet, Cisco, Huawei, Sophos, and Barracuda.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Channel Sales Manager at a tech services company with 51-200 employees
Real-time prevention enhances security while reporting offers room for improvement
Pros and Cons
- "The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities."
- "Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better."
What is our primary use case?
My main use case for Check Point NGFW is that my organization is using it as a firewall and using it in emails also.
How has it helped my organization?
I can walk you through a situation where Check Point NGFW made a difference for my organization by helping in getting or stopping the emails which are unwanted and can be harmful for my organization.
What is most valuable?
The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities.
These features impact my day-to-day operations by helping in improving the security postures in day-to-day activities.
What needs improvement?
Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better.
For how long have I used the solution?
I have been using Check Point NGFW for around half a year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 20, 2025
Flag as inappropriateSenior Security Analyst at a tech services company with 201-500 employees
Security management improves with enhanced threat prevention strategies
Pros and Cons
- "Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management."
- "Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture."
What is our primary use case?
The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.
How has it helped my organization?
Check Point NGFW has positively impacted my organization because, as a security provider, we have business from multiple nations worldwide, but certain nations where we do not have any business relevancy require traffic blocking.
Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management. These features have helped us manage and strengthen our security posture.
We have observed improved network visibility and control with detailed reporting and logging after implementing Check Point NGFW, along with a stronger compliance posture and reduction in incidents.
What is most valuable?
In my experience, Check Point NGFW offers excellent region-wise blocking capabilities, which proved particularly valuable during recent tension between India and Pakistan border crossing issues.
The IPS, anti-bot, threat emulation, and URL filtering features are working exceptionally well from a prevention perspective.
What needs improvement?
Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture. Licensing can be confusing and expensive, so segregating it into a simple format would be helpful.
Software updates and hot fixes require compatibility checks to avoid disrupting the production environment.
For how long have I used the solution?
I have been using Check Point NGFW for almost a year and a half.
How was the initial setup?
My experience with pricing, setup costs, and licensing for Check Point NGFW has been straightforward, as everything is better and convenient to use.
What other advice do I have?
I work in Secure System Private Limited as a security analyst for the last six years. I can share specific outcomes and metrics I have seen since using Check Point NGFW.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 19, 2025
Flag as inappropriatePresident of the Advisory Board at a computer software company with 201-500 employees
Reliable core firewall enables secure and efficient transactions
Pros and Cons
- "Check Point's solutions allow organizations to operate securely with a reliable core firewall in place, ensuring that transactions proceed smoothly."
- "The user interface could be more user-friendly."
What is our primary use case?
We are using the solution for the perimeter. It's used as a core firewall, with almost all transactions passing through the firewall. For instance, in a cellular phone company, all transactional authorizations pass through the firewall, while in a bank, authorizations for branches and ATMs go through the firewall. The main customers are in the BFSI, telcos, industry manufacturing, and other large enterprise sectors.
How has it helped my organization?
Check Point's solutions allow organizations to operate securely with a reliable core firewall in place, ensuring that transactions proceed smoothly.
What is most valuable?
The Check Point firewall is used as a core firewall offering high reliability with at least two synchronized data centers, creating a fault-tolerant configuration. It is considered a very stable platform with minimal bugs.
What needs improvement?
Technically, there is no need for improvement. That said, they need to be more aggressive and protect more of the channels on the commercial side. Additionally, the user interface could be more user-friendly.
For how long have I used the solution?
We have been using Check Point solutions for over twenty-five years, since the very beginning.
What do I think about the stability of the solution?
The firewall is highly stable, being described as one of the most reliable, with a stable platform and few bugs.
What do I think about the scalability of the solution?
Using the Maestro technology, the firewall has good scalability. It allows for flexibility and growth by stacking clippings without needing to change the chassis.
How are customer service and support?
Customer service is generally good. With Diamond or Diamond Plus service for banks, the support level meets customer expectations. The internal team of Check experts also ensures issues are resolved efficiently.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are familiar with and have supported other solutions like Fortinet, Palo Alto, and Cisco yet primarily do business with Check Point.
How was the initial setup?
Initial setup can be complex, especially in large or redundant deployments. Expertise is required to manage configurations, especially with complex operations and a high volume of users and VPNs.
What about the implementation team?
The implementation team has around 20 people, with a total group including maintenance and support numbering 60.
What was our ROI?
Monetizing the risk is complex, and despite having software for calculating ROI in security, traditional calculations like the FAIR methodology do not apply efficiently in Latin America.
What's my experience with pricing, setup cost, and licensing?
Check Point and Palo Alto solutions are among the more expensive options, but once a platform is adopted, switching is difficult. Clients tend to stay with the same brand for extended periods.
Which other solutions did I evaluate?
We have evaluated solutions from Fortinet, Palo Alto, and Cisco, however, the main offering is Check Point.
What other advice do I have?
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
RSSI at a government with 1,001-5,000 employees
Provides good efficiency and technical support
Pros and Cons
- "The most valuable feature of the solution is its efficiency."
- "You have an administration tool that is not on the appliance, and it should be in line with the appliance."
What is most valuable?
The most valuable feature of the solution is its efficiency.
What needs improvement?
You have an administration tool that is not on the appliance, and it should be in line with the appliance. You can put your modification online and compile it again before applying.
For how long have I used the solution?
I have been using Check Point NGFW for seven years.
How are customer service and support?
The solution's technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Cisco. We switched to Check Point NGFW because Cisco was comparatively a bit outdated.
What's my experience with pricing, setup cost, and licensing?
Check Point NGFW is a little expensive. We paid around 70,000 Euros for it, and the solution's maintenance fee is expensive. We also have to pay for technical support.
What other advice do I have?
I am generally satisfied with the solution. The new Check Point products are more powerful than the previous appliances. The product is good but perhaps more adapted to big firms than small companies.
Overall, I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
















