We're using Check Point NGFW for network security, intrusion detection, intrusion prevention, application control, DDoS attack protection, sandblast, mobile device management, identity-based access control, reporting, access control policy, scalability, state-of-the-art security gateway, support, threat prevention, accelerated policy installation, concurrent security policy installation, advanced routing, easy upgrading, logging and monitoring, smart events, and smart console.
It's easy to set rules and policies, which has greatly simplified cleanup and management.
Pros and Cons
- "Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic."
- "Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade."
What is our primary use case?
How has it helped my organization?
Check Point has improved our organization's security posture, especially the IBAC, application control, IPS, and IDS. It's easy to set policies on the firewall, which has greatly simplified cleanup and management.
We recently upgraded from R80.10 to R40, and we've had an overwhelmingly positive experience with this version. Our visibility of threats and vulnerabilities has improved. Check Point added new features and revamped its reporting and analysis.
What is most valuable?
Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic.
What needs improvement?
Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade.
I would also like it if Check Point cut the number of steps needed to upgrade from R77 to R81. They should also make it possible to convert access control policies from the firewall to the management server and to downgrade from a higher version to a lower one.
Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
I've been using Check Point NGFW for six years.
What do I think about the stability of the solution?
The solution has been stable, and Check Point promptly delivers patches and updates.
How are customer service and support?
I rate Check Point support nine out of 10. When we need help, they're always fast and efficient. Check Point's customer service is one of the major reasons we've stuck with this solution.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We adopted Check Point because of the cost and support.
How was the initial setup?
If you have the right training, you can set up Check Point with minimal supervision.
What's my experience with pricing, setup cost, and licensing?
Before you buy, check which features you need, and if possible, I recommend signing up for at least a three-year license.
Which other solutions did I evaluate?
We considered several vendors, including Fortinet, Cisco, Huawei, Sophos, and Barracuda.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Engineer II at Baptist Health
Good antivirus protection and URL filtering with very good user identification capabilities
Pros and Cons
- "The scalability is very good."
- "I'd like to see more use of applications and URLs in security policies moving forwards."
What is our primary use case?
The primary use case for these firewalls is to protect our perimeter from unwanted traffic in and out of our network as well as to control the flow of data to comply with our company security policies.
It also plays an integral part in restricting or granting access at a granular level for certain users or vendors allowing us to monitor and protect end-customer data as well as protecting our users and network from malware, bots, ransomware and other bad actors that could disrupt our business operations.
How has it helped my organization?
Check Point NGFW products have improved the operation of our organization by allowing us to secure our perimeter from attacks, probes, malware, DDoS, bots and general bad actors. It also allows us to secure outbound traffic from our users.
It allows us to fine tune how we allow users to access resources both in our DMZ and externally. This helps us to secure customer and user data in order to prevent privacy issues, prevent loss of operations or downtime which we cannot accept.
Being able to use the products in redundant pairs has also allowed us to provide a more stable network.
What is most valuable?
There are several useful features that we utilize that are now valuable assets in terms of protecting the network. These would include user identification (ID Collector), IPS, antibot, antivirus, application, and URL filtering as well as the standard firewall security rules. They all work together to provide layers of security to protect both inbound and outbound traffic in order to minimize loss of private data as well as to ensure our network is free of bad actors attempting to use malware or ransomware against us.
What needs improvement?
Check Point could improve its products by working on stability. Overall, it is a stable platform, however, at times we have issues with 'quirks' and bugs that cause issues for our end users and typically are not straightforward to fix.
Another issue that presents itself is upgrading. Small hot fixes are not problematic. That said, updating to a new version of the OS has been an absolute nightmare and caused significant downtime and a number of issues - not to mention wasted engineering time. Simplify the upgrade process and they may regain confidence in this area!
I'd like to see more use of applications and URLs in security policies moving forwards.
For how long have I used the solution?
I've worked with the solution for seven years across two different companies.
What do I think about the stability of the solution?
The stability is good, yet it could use some improvement.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
It has always been slow and difficult to use technical support. It depends on a case-by-case basis, however, you have to chase and manage the case yourself or it will go nowhere. This likely comes down to a lack of experienced agents.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used Cisco ASA. We switched due to the fact that Cisco's product was very hard to manage and lacked any real intelligence.
How was the initial setup?
The initial setup is complex. A very large and multifaceted environment will always be complex to configure.
What about the implementation team?
We used vendor support and account teams and in-house technical engineering.
What's my experience with pricing, setup cost, and licensing?
It's expensive, however, compared to the cost of not protecting the network properly, it's worth the cost.
Which other solutions did I evaluate?
We looked at Palo Alto, Fortinet, and Cisco.
What other advice do I have?
Carefully consider the vendor before making a leap. It's very difficult and costly to change vendors at a later date.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
Channel Sales Manager at Ivalue Infosolution
Real-time prevention enhances security while reporting offers room for improvement
Pros and Cons
- "The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities."
- "Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better."
What is our primary use case?
My main use case for Check Point NGFW is that my organization is using it as a firewall and using it in emails also.
How has it helped my organization?
I can walk you through a situation where Check Point NGFW made a difference for my organization by helping in getting or stopping the emails which are unwanted and can be harmful for my organization.
What is most valuable?
The best features Check Point NGFW offers in my experience are the real-time prevention and the virtualization and reporting capabilities.
These features impact my day-to-day operations by helping in improving the security postures in day-to-day activities.
What needs improvement?
Monitoring graphs for Check Point NGFW can be made better, and that is something I wish worked better.
For how long have I used the solution?
I have been using Check Point NGFW for around half a year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 20, 2025
Flag as inappropriateSenior Security Analyst at SecurView Systems Pvt Ltd
Security management improves with enhanced threat prevention strategies
Pros and Cons
- "Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management."
- "Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture."
What is our primary use case?
The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.
How has it helped my organization?
Check Point NGFW has positively impacted my organization because, as a security provider, we have business from multiple nations worldwide, but certain nations where we do not have any business relevancy require traffic blocking.
Check Point NGFW helps us significantly by preventing sophisticated cyber attacks, controlling user access to application websites based on policy and user identity, segmenting the internal network, and providing centralized firewall management. These features have helped us manage and strengthen our security posture.
We have observed improved network visibility and control with detailed reporting and logging after implementing Check Point NGFW, along with a stronger compliance posture and reduction in incidents.
What is most valuable?
In my experience, Check Point NGFW offers excellent region-wise blocking capabilities, which proved particularly valuable during recent tension between India and Pakistan border crossing issues.
The IPS, anti-bot, threat emulation, and URL filtering features are working exceptionally well from a prevention perspective.
What needs improvement?
Check Point NGFW deployment in our organization showed that the initial setup and policy design can be complex, especially for teams unfamiliar with Check Point's architecture. Licensing can be confusing and expensive, so segregating it into a simple format would be helpful.
Software updates and hot fixes require compatibility checks to avoid disrupting the production environment.
For how long have I used the solution?
I have been using Check Point NGFW for almost a year and a half.
How was the initial setup?
My experience with pricing, setup costs, and licensing for Check Point NGFW has been straightforward, as everything is better and convenient to use.
What other advice do I have?
I work in Secure System Private Limited as a security analyst for the last six years. I can share specific outcomes and metrics I have seen since using Check Point NGFW.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 19, 2025
Flag as inappropriateRSSI at SDIS49
Provides good efficiency and technical support
Pros and Cons
- "The most valuable feature of the solution is its efficiency."
- "You have an administration tool that is not on the appliance, and it should be in line with the appliance."
What is most valuable?
The most valuable feature of the solution is its efficiency.
What needs improvement?
You have an administration tool that is not on the appliance, and it should be in line with the appliance. You can put your modification online and compile it again before applying.
For how long have I used the solution?
I have been using Check Point NGFW for seven years.
How are customer service and support?
The solution's technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Cisco. We switched to Check Point NGFW because Cisco was comparatively a bit outdated.
What's my experience with pricing, setup cost, and licensing?
Check Point NGFW is a little expensive. We paid around 70,000 Euros for it, and the solution's maintenance fee is expensive. We also have to pay for technical support.
What other advice do I have?
I am generally satisfied with the solution. The new Check Point products are more powerful than the previous appliances. The product is good but perhaps more adapted to big firms than small companies.
Overall, I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager - IT at NVCL Group
By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization
Pros and Cons
- "It enhanced our organization's security posture compared to our previous solution."
What is our primary use case?
The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies.
How has it helped my organization?
It enhanced our organization's security posture compared to our previous solution. It offers superior protection with advanced threat management capabilities, including robust firewall defenses, intrusion prevention, and real-time anti-virus and anti-malware protection.
This has markedly reduced our vulnerability to cyber threats. Additionally, the appliance's content filtering and application control features have enabled us to manage bandwidth more efficiently, prioritizing critical business applications and preventing unnecessary traffic. This optimization has not only improved network performance but also reduced operational costs by eliminating bandwidth wastage.
What is most valuable?
The WatchTower feature is particularly valuable, providing real-time monitoring of incidents, which enhances our ability to promptly address and mitigate security threats, ultimately leading to reduced overheads and improved overall efficiency.
The WatchTower app is accessible from mobile devices, providing administrators with the flexibility to monitor and manage security on the go. This mobility ensures that security management is not confined to the office, allowing for rapid response even when off-site.
What needs improvement?
They should improve integration with third-party security tools and software for a more unified security ecosystem.
They should enhance compatibility with various network environments and cloud platforms can be valuable. Offer more comprehensive support options, including extended hours and more accessible resources.
They should provide more extensive training materials and documentation to help users maximize the appliance's capabilities. Integrate user awareness and training modules within the appliance to educate employees on security best practices.
For how long have I used the solution?
We have been using it for more than two years.
What do I think about the stability of the solution?
Stability is exceptionally positive. Since its implementation, the appliance has demonstrated remarkable reliability and uptime, consistently maintaining our network's security without disruptions
What do I think about the scalability of the solution?
It provides a robust and scalable solution that meets both our current requirements and future growth plans.
How are customer service and support?
Customer service is overall good, but we would like it to be more enchnaced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used a different security solution but we switched it because of a phishing attack. Though we had a solution, it had not done its job perfectly.
How was the initial setup?
The setup is straightforward.
What about the implementation team?
We implemented it through a vendor. I would rate it an eight out of ten.
What was our ROI?
It helped us reduce operational costs associated with network security. By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization.
What's my experience with pricing, setup cost, and licensing?
Setup cost is not much, hence pricing and licensing need to be considered. If pricing gets lower that would be great.
Which other solutions did I evaluate?
We previously used a different security solution but switched to the Quantum Spark Security Appliance 1570 due to several issues with the old system. Our previous solution lacked advanced threat management features like real-time anti-virus and anti-malware protection, and had ineffective bandwidth management leading to network performance bottlenecks.
What other advice do I have?
This is a best solution for us so far and we recommend this to anyone.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Information Security Officer at a consultancy with 1-10 employees
Safeguards networks against a wide range of cyber threats with its robust security features, advanced threat prevention and centralized management
Pros and Cons
- "Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness."
- "Scalability should be improved."
What is our primary use case?
It can function as either a standalone appliance or as part of a clustered solution, offering flexibility to suit the needs of various customers, ranging from small businesses to large enterprises. We have experience working with a diverse clientele across different industries, leveraging Check Point's solutions to provide comprehensive network security tailored to each organization's requirements.
What is most valuable?
Extracting data from the logs and utilizing the log analyzer tool provides valuable insights and enhances the product's overall effectiveness.
What needs improvement?
Managing a smaller number of firewalls is straightforward, but as the scale increases, especially with numerous firewall instances, the complexity grows significantly. Scalability should be improved.
For how long have I used the solution?
I have been working with it for twenty years.
What do I think about the stability of the solution?
It offers good stability capabilities.
What do I think about the scalability of the solution?
We've encountered challenges related to scalability, particularly with its performance slowing down as the volume of objects in the network grows.
How are customer service and support?
While most engineers are typically responsive, there may be variations in their availability and response times. I would rate its customer service and support eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I also work with Fortinet, and I find it preferable because it offers a wider range of options. Additionally, its integrated package functions exceptionally well, with seamless coordination between services.
How was the initial setup?
The initial setup process is typically straightforward for most customers. However, when comparing Check Point with other solutions like FortiGate, there's a notable difference in how policy rules are implemented. With Check Point, you need to install the entire policy each time you want to make changes, whereas FortiGate allows for more streamlined updates by simply accepting the modifications. This can sometimes add complexity to installing a new policy with Check Point.
What about the implementation team?
The deployment time varies depending on the scale of the project. For small cases, it may only take a couple of minutes, while larger-scale deployments can span up to a month. Having a skilled engineer is crucial; one proficient engineer can handle the job effectively. Maintenance is relatively straightforward.
What's my experience with pricing, setup cost, and licensing?
While it may be slightly more expensive, when compared with competition it is reasonable. Licenses are renewed annually.
What other advice do I have?
Overall, I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Consultant
Works at sep2
Good application control/URL filtering with helpful support
Pros and Cons
- "The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network."
- "One feature that could be improved is the internet object in the application control/URL filtering blade."
What is our primary use case?
My primary use case of Check Point's firewalls is to provide in-depth network filtering with advanced threat prevention, which can be set up simply using autonomous threat prevention where the firewall learns about the environment and then actions threat prevention based upon that. The threat prevention can also be custom-built for your environment.
I also use the Check Point Always On VPN for remote endpoints, which allows users to authenticate and connect to the VPN pre-login without any input from the users.
How has it helped my organization?
It has improved my organization due to the in-depth security it provides. Check Point has a lot of security-focused features that provide a great level of network security. It has improved the security posture of the organization due to the granularity that can be set in the policies, such as using access roles to set user-based access, and time-based rules to only apply a specific firewall rule at a specific time. It has also improved my organization because of the in-depth troubleshooting steps that are made available to the end user, meaning we can troubleshoot issues easily, and troubleshooting steps can get very advanced.
What is most valuable?
I have found the VPN and the application control/URL filtering the most valuable features. The main reason for this is that the VPN blade allows easy VPN setup between two VPN gateways, allowing for not only site-to-site VPNs but also for remote users to connect to the Check Point gateways. This feature is easy to set up. Also, users can troubleshoot the VPNs very in-depth.
The application control and URL filtering features are valuable since they allow very granular control of what is coming in and out of a network. Instead of just allowing certain Layer 4 ports in/out of the network, specific applications can be allowed, which not only can tighten a security posture. It makes administering the product easier as, when a new app is rolled out, it can simply be added to the policy.
What needs improvement?
One feature that could be improved is the internet object in the application control/URL filtering blade. In most deployments, this works as it says it will. However, the object is based on topology, not internet IP ranges. This means that in certain scenarios (and likely a non-standard deployment), the internet object can not refer to the internet. This can be bypassed by creating a networking group containing class A, B & C networks and using this in the policy, right-clicking the group and ticking 'negate.'
Another improvement would be to improve the simplicity of deploying SAML as an authentication option when connecting using a remote access VPN. Check Point's deployment guide is very in-depth. However, the process could be simpler.
For how long have I used the solution?
I've used the solution for three years.
What do I think about the stability of the solution?
The stability is very good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Support is very good from Check Point.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be straightforward or complex depending on the complexity of the environment. Usually, it is fairly straightforward.
What about the implementation team?
We implemented the solution in-house.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. I provide Check Point support, as well as use these firewalls.

Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?