The primary distinction between an NG Firewall and a traditional firewall lies in their configuration flexibility and scalability. Regarding options and features, the spoofing functionality in Check Point has been instrumental in enhancing security in our critical environment. It plays a crucial role in securing our internet connectivity.
Security Consultant at a real estate/law firm with 1,001-5,000 employees
Enhanced functionality with challenges regarding resource efficiency
Pros and Cons
- "Its functionality is highly satisfactory."
- "While it does enhance network security, it tends to consume substantial resources, including CPU, memory, and storage."
What is our primary use case?
What is most valuable?
Its functionality is highly satisfactory. In the newer Check Point version, there are additional features in VPN and IP security that enhance tunnel security. This flexibility extends to the Check Point MDM platform, allowing for streamlined management across different domains. In my current client's complex infrastructure, there's often a need to replicate rules from one firewall to another within the same room. With Check Point, it's a straightforward process of creating the rules in one policy and then easily copying and pasting them into other policies.
What needs improvement?
The log management process in MDS consumes a significant amount of storage, so it would be highly beneficial if there's an opportunity to optimize these logs and save storage space. While it does enhance network security, it tends to consume substantial resources, including CPU, memory, and storage. It could be an exceptionally useful and efficient solution if there were outgoing or AI-driven algorithms to streamline log management and periodically delay the logs.
For how long have I used the solution?
I have been working with it for almost four years.
Buyer's Guide
Check Point Quantum Force (NGFW)
February 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
What do I think about the stability of the solution?
Regarding stability, I would rate it seven out of ten. While there have been occasional issues like false positives and blocking misreads in my NGFW, overall, it's a good product.
What do I think about the scalability of the solution?
In terms of scalability, I would rate it seven out of ten.
How are customer service and support?
The level of support provided depends on the specific contract. With a premium contract, it gets you treated as a top-priority customer, and they respond promptly, making every effort to find solutions. If you have a standard support contract, your experience might be more like that of an ordinary customer. In general, I've found them to be helpful, and I would rate their support six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I was working with Palo Alto for a couple of years, and I found their data protection functionality to be particularly interesting. I believe this feature is quite innovative and that other vendors should consider taking inspiration from it.
How was the initial setup?
When it comes to the setup process, I've noticed that publishing and informing policies in different steps can be a bit complex. The typical sequence of publishing policies, configuring them, and then deploying them to the firewall can feel suboptimal at times. There are situations where an immediate policy installation is needed and it would be beneficial if there were options to install policies directly before the publishing step. Overall, the setup process is not overly complex, but it's not as straightforward.
What's my experience with pricing, setup cost, and licensing?
When it comes to the quality-price ratio, I've found that Check Point offers a competitive balance in the market. I would rate it four out of ten.
What other advice do I have?
I would rate it six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a tech services company with 11-50 employees
Good intrusion prevention and virtualized security with remote access VPNs for partner sites
Pros and Cons
- "Check Point offers virtualized systems, making it easy to scale."
- "Currently, upgrades are quite cumbersome."
What is our primary use case?
We've used the solution for perimeter and DMZ security as we host a website that is accessible online.
On the perimeter, we have Check Point acting as the entry point to our web server farm with load balancers. The access policy is configured with the least privilege, only allowing connections that are part of business requirements.
Intrusion prevention is enabled in prevent mode to detect and block well-known vulnerabilities and attacks. The device connects to Check Point's cloud for updates on signatures to new threats.
We are peering with Partners via Site-to-Site VPNs for Services.
How has it helped my organization?
1. It's offering perimeter security to publicly accessible sites. There's better security at the edge and DMZ with the use of access policies.
2. The activation of Intrusion Prevention Blades offers better security at the perimeter and between DMZ Zones. IPs also have prebuilt security profiles making deployments of IPS fast and efficient, and exceptions to the rule base are easy.
3. The use of a remote access VPN is used to connect to partner sites.
4. Check Point offers virtualized systems, making it easy to scale. Instead of buying new equipment, we have set up virtual systems for the DC and user networks.
What is most valuable?
1. Intrusion prevention. Preventing and detecting well know vulnerabilities to our publicly accessible systems is easy. Inbuilt predefined security profiles can be deployed out of the box.
2. Virtualized security. Virtualized products are used to provide more scalability and ease of administration to the network.
3. Identity awareness. Granular policies on the firewall are based on identities.
4. Site-to-site VPN. We can make connections with partners securely.
5. Reporting. Prebuilt reports that are already in a well-presented manner could be presented to management.
6. Access Policy and NAT rules base.
What needs improvement?
1. Complexity in upgrades. Currently, upgrades are quite cumbersome. I would prefer the click of a button and process upgrades.
2. Pricing. The pricing is quite high as compared to other industry firewalls (such as Cisco or Fortinet).
3. Documentation. They have to improve on providing more documentation and examples for certain features online. In other sections, it feels shallow and we could use more information and examples.
4. Complexity in system tweaks. There are some knobs that need to be tweaked at the configuration files on the CLI which can be considered complex.
5. Check Point Virtual Security. The features take a bit more time to be released as compared to physical gateways.
For how long have I used the solution?
I've used the solution from 2017 until now.
What do I think about the stability of the solution?
A word of caution, especially on new software: you might hit a couple of bugs. Therefore, the general recommendation is to wait for a few takes before upgrading to a major version.
With older versions it's stable.
What do I think about the scalability of the solution?
The solution offers high-performance devices ranging from small to big data centers.
Virtual Security offers up to 13 connected gateways helping with managed security.
How are customer service and support?
First-line support is hit or miss, and at times getting an engineer to assist on the call can take hours.
Opening tickets on the Check Point platform is ok with the first response depending on the workload of the engineers.
This is one place Check Point needs to improve.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we were using Cisco ASA 5585. However, the performance was not reliable, and scaling would have been an issue.
We opted to go with Check Point, which could handle high performance and scaling was easier. Check Point also offered IPS features which were easier. Check Point also had better reporting and management tools.
How was the initial setup?
The initial setup was a bit complex since we were deploying virtual systems.
The interface configurations, access policy, VPNs, and NAT setup were easy. The complexity was in understanding how Check Point handles virtualized security instead of physical security gateways.
What about the implementation team?
The initial implementation was with the help of a vendor with good knowledge of the product.
What was our ROI?
It's used to protect the organization from security threats and provide connectivity to our applications which is the main platform for business. That's the ROI we've noted.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing for Check Point are high.
Which other solutions did I evaluate?
Due to experience with Check Point, we did not evaluate other options (like Fortigate or Palo Alto).
What other advice do I have?
Generally, Check Point is a good product with a lot of security features that I would recommend to any organization.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
February 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
United Airlines at a transportation company with 10,001+ employees
Great VSX, URL filtering, and DLP capabilities
Pros and Cons
- "HTTP forwarding is something I haven't seen elsewhere."
- "The web UI for VSX could be better."
What is our primary use case?
We are a top enterprise with a huge Check Point presence. We have been using Check Point since its older R65 version, and we are currently on the R81 version.
We have close to 200 Check Point devices for DC and all remote sites. We are also using Check Point for our edge security along with the Sandbox environment.
Check Point is also used as a VPN solution which is a pretty easy setup.
Check Point Cloud Guard is an excellent find we were able to do some cloud-based networking in our private cloud.
HTTP forwarding is one feature that I haven't seen in Check Point's competitors. With it, I can just send all HTTP traffic to a cloud-based proxy directly without building a GRE tunnel or VPN.
How has it helped my organization?
We took some major leaps with Check Point virtualization. VSX is one of the phenomenal features of Check Point. It allows us to virtualize multiple environments. We have saved hundreds of thousands of dollars with VSX.
Instead of using a number of small firewalls, we bought a couple of CP 23K series with 20 virtual licenses. It really worked for us with the MDS and smart log.
HTTP forwarding is something I haven't seen elsewhere.
What is most valuable?
VSX, URL filtering, and DLP are all excellent. VSX is the best thing we have used. We can use virtual switches and virtual routers for VLAN extensions. Another great feature is the "Active-Active" state that no other firewalls provide. I worked with other vendors as well; however, Check Point is the only one that can provide very good support on the Active-Active state. I still like the traditional way of troubleshooting using TCPDUMP and the FW monitor. Application IDs can be used, which is a significant improvement from previous versions.
What needs improvement?
The web UI for VSX could be better. As we enable VSX on physical gateways we cannot access the web UI. Smart log setup isn't so easy. We have some issues with some domains, however, overall, the smart log is a really good feature that helps navigate to the right domains for troubleshooting.
We have so many applications, including smart updates, provisioning, etc. I would like to see a single pane where I can do everything instead of going to each application and making changes.
More and more application IDs and integration is a really good thing and that's something I am looking for.
For how long have I used the solution?
I've used the solution for eight years.
Which solution did I use previously and why did I switch?
We used another solution before, which was only command-line based. Check Point was only the major competitor and best option a decade ago.
What's my experience with pricing, setup cost, and licensing?
We need to choose technology first, and obviously, others follow. Check Point's three-tier architecture is the main reason for us using it. I believe the pricing is pretty competitive.
Which other solutions did I evaluate?
We did look at other options, including Fortinet, however, nothing is as good as Checkpoint.
What other advice do I have?
Check Point is a good solution. It is a reliable solution above all.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Security Specialist at a financial services firm with 10,001+ employees
Smart, simple, and user-friendly
Pros and Cons
- "The solution offers a good GUI."
- "The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions."
What is our primary use case?
We are using physical appliances along with some VSX's in our network. We mostly use firewall only (due to high traffic usage). We are using CP NGFW to protect the company from the internet and also provide security while we are connecting to the internet.
We have physical clusters that we manage via our company's external connections through S2S. We are managing our core and client networks with separate clusters. Applying security rules and providing NAT when we need it. We are also using CP in our DRC environment to provide SRC and DST NAT with VSX to provide access to machines that have the same IP addresses.
How has it helped my organization?
Back when we had a different brand of firewalls, we were having trouble managing all of them separately. With Check Point's HA capability, we merged all of our Check Point firewall management. With this, we can apply a viable DRC solution that our company needs and also manage, view logs, and administer all of the components together.
With the capable appliances, we don't experience any CPU and Memory utilization most of the time. With the help of new versions, Check Point is moving forward. We hope the upcoming version will provide hyper flow, and this will solve our elephant flow problem.
What is most valuable?
The solution offers a good GUI. It is easy to use, smart, simple, and user-friendly.
The client VPN and S2S VPN capabilities are great. Check Point's mobile access provides us with flexibility. We don't have a single point of failure regarding the VPN access points anymore.
We can use Check Point NGFW physically, virtually (with Check Point VSX), and on the cloud with CloudGuard. We have most of the features available even within these different environments.
We can apply SAM Rules (without installation needs), and Custom Intelligence Feeds.
It has good API support and provides value when you need it.
What needs improvement?
The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions. Other vendors provide this, including Palo Alto). We are in a big organization now, and we need good tools to maintain stability and get rid of the objects and rules that we don't use.
If you are working within a big organization, you may have some CPU and memory utilization problems. Most of the time, we are encountering these kinds of problems, and due to that, we can't use other features and blades other than the firewall or threat prevention.
I find Check Point's log experience a little tiresome as it does not provide information with limited blades enabled. We'd like to see information around session time, sent and received bytes, etc. Even if you manage to get some data, you may find it not very reliable.
For how long have I used the solution?
I've been using Check Point's NGFW and its features for about five years.
What do I think about the stability of the solution?
I found Check Point's stability a little bit so-so. Not that good, not that bad. Most of the time it is reliable. We had lots of problems before due to the utilization of our firewalls. Most of the time, the hotfixes provided the solution. However, applying hotfixes and getting in touch with the R&D when needed may be tiresome.
What do I think about the scalability of the solution?
It's pretty good. The HA Features provide a good solution so far, and with Maestro it will perform better.
Which solution did I use previously and why did I switch?
I had the chance to work with Fortigate and Palo Alto Firewalls before. Due to the stability and know-how regarding Check Point, we chose this vendor.
What was our ROI?
We always believed and saw that the money we spent on Check Point was not in vain.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Solutions Architect at a logistics company with 10,001+ employees
Easy to manage with good hyperscaling and helpful technical support
Pros and Cons
- "By far, it's the best security solution one can adopt for their organization."
- "The perimeter antivirus can be improved. It's not as good as other leaders."
What is our primary use case?
The device is being used for perimeter security devices across multiple clients across sites. Check Point has not only improved our organization - it also has given us holistic perimeter and endpoint security protection throughout the enterprise.
Our sites across the globe have Check Point perimeter protection.
Pros include:
- Internal Network Protection from outside network
- VPN connectivity for secure data transmission across multiple vendors
- File download antivirus security
- URL Filtering
- Application filtering
- Malicious domains blocking
How has it helped my organization?
The solution has helped out organization stay safe with its depth application filter, URL filtering, and SSL inspection. It's mitigated a significant amount of risk for corporate users as well as to host services at our terminal that need access from the internet. By far, it's the best security solution one can adopt for their organization.
It's:
- Reduced attacks on DMZ servers
- Blocked access of malicious destinations hit by internal users
- Complete visibility about what is going and what is coming via internet
- Check Point is the industry’s unified cybersecurity architecture that protects businesses against sophisticated 5th generation cyber-attacks.
- Having multiple checkpoint products under the same roof provides consolidated security.
- Ultimately saving cost by having better centralized solution
What is most valuable?
The solution has a lot of valuable aspects, including:
- IPS & IDS
- Sandbox (Threat Emulation & Extraction)
- Ease of management
- Reports for analysis
- Better technical support
- Stateful inspection
- Application-aware boxes
- Threat detection capabilities
- Hyperscaling
Data loss prevention, compliance, threat emulation, and other blades overall make this a robustly unified platform for the implementation and management of security controls.
Since it is Layer 7, we are able to get down to the application level and block certain applications from even running.
Since it has an IPS in place, we are able to see possible attacks that have been prevented by the firewall.
What needs improvement?
The perimeter antivirus can be improved. It's not as good as other leaders.
Additional features that could be good to have/improved include:
- Modular capabilities
- Integration with VMware and NSX products per client requirement
- 3rd Party support product is very limited
The solution can integrate with other vendors to form IPsec connectivity with redundancy - which is only possible now between the CP to CP FW only.
The licensing part is a bit tricky. The product can simplify this further for ease of use.
They need to work on log size optimization.
Antivirus signatures should be updated in real-time.
For how long have I used the solution?
We've used the solution for the last eight years.
What do I think about the stability of the solution?
The stability is very good.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
Technical support has been great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We had a vendor assist us.
What's my experience with pricing, setup cost, and licensing?
We haven't used other products.
Which other solutions did I evaluate?
We also looked at FortiGate and Palo Alto.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
It's easy to set rules and policies, which has greatly simplified cleanup and management.
Pros and Cons
- "Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic."
- "Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade."
What is our primary use case?
We're using Check Point NGFW for network security, intrusion detection, intrusion prevention, application control, DDoS attack protection, sandblast, mobile device management, identity-based access control, reporting, access control policy, scalability, state-of-the-art security gateway, support, threat prevention, accelerated policy installation, concurrent security policy installation, advanced routing, easy upgrading, logging and monitoring, smart events, and smart console.
How has it helped my organization?
Check Point has improved our organization's security posture, especially the IBAC, application control, IPS, and IDS. It's easy to set policies on the firewall, which has greatly simplified cleanup and management.
We recently upgraded from R80.10 to R40, and we've had an overwhelmingly positive experience with this version. Our visibility of threats and vulnerabilities has improved. Check Point added new features and revamped its reporting and analysis.
What is most valuable?
Check Point's rule management helped us simplify access control. At one point, we had more than 1,000 access control policies, and it was challenging to manage them all. We cut it down to 300 policies using Check Point's management features, and we are still working on reducing this further to achieve the best way to manage policies. Its logging and monitoring enable us to trace and investigate suspicious traffic.
What needs improvement?
Check Point doesn't warn us when rules are about to expire. It was also inconvenient that we had to change hardware when we upgraded. It would be nice if they made the new version compatible with current hardware or if it only required a minor upgrade.
I would also like it if Check Point cut the number of steps needed to upgrade from R77 to R81. They should also make it possible to convert access control policies from the firewall to the management server and to downgrade from a higher version to a lower one.
For how long have I used the solution?
I've been using Check Point NGFW for six years.
What do I think about the stability of the solution?
The solution has been stable, and Check Point promptly delivers patches and updates.
How are customer service and support?
I rate Check Point support nine out of 10. When we need help, they're always fast and efficient. Check Point's customer service is one of the major reasons we've stuck with this solution.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We adopted Check Point because of the cost and support.
How was the initial setup?
If you have the right training, you can set up Check Point with minimal supervision.
What's my experience with pricing, setup cost, and licensing?
Before you buy, check which features you need, and if possible, I recommend signing up for at least a three-year license.
Which other solutions did I evaluate?
We considered several vendors, including Fortinet, Cisco, Huawei, Sophos, and Barracuda.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT Department at a tech services company with 11-50 employees
Offers great adaptability and a configurable nature
Pros and Cons
- "The solution's most valuable feature is its adaptability and configurable nature."
- "The product's price is an area of concern, making it an area where I would like to see some improvements."
What is our primary use case?
I use the solution in my company for cybersecurity, securing perimeter networks, giving the user access to VPN, URL filtering, antivirus, sandblast, network segmentation, and monitoring purposes.
How has it helped my organization?
Regarding the benefits of using the tool, I would say we spend less time investigating security incidents because we have fewer of them to deal with because Check Point works quite well. The tool offers greater visibility when it comes to network traffic.
What is most valuable?
The solution's most valuable feature is its adaptability and configurable nature. The software's security posture, I would say, has reduced vulnerabilities than other vendors, and we value that greatly in our company.
What needs improvement?
The product's support is an area of concern where improvements are required. Sometimes, there are bugs in the software, and the speed at which the product resolves those bugs could be improved. The system is quite complex, and you need to be an expert to get the most benefits, making it an area where the tool could be improved.
It would be nice if Check Point could update its own agents, for example, VPN clients or identity clients. I think the product has a very large number of features.
The product's price is an area of concern, making it an area where I would like to see some improvements.
For how long have I used the solution?
I have been using Check Point NGFW for a bit less than fifteen years. I use Check Point R81.20.
What do I think about the stability of the solution?
In the past three months, my company has had stability issues, but the impact was quite low, which is great because we have a cluster environment. When one node fails, the other one picks up the job. When changing from version to version, sometimes bugs show up that need to be resolved.
What do I think about the scalability of the solution?
The tool allows you to add as many nodes as you like or can afford. If it is virtualized, you can also give it more resources.
In my company, I think we have four nodes, which are the main nodes, and then we have eight smaller regional nodes. We have around 260 users and 280 endpoints.
How are customer service and support?
I rate the technical support a five or six out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The product's initial setup phase was so long ago that I don't remember how it went. The product is not the most intuitive and easy to set up because of the large number of settings you can configure and the ways how you can configure those settings. Without an expert or consultant, I wouldn't recommend implementing the tool by yourself if you value your time and don't want a big downtime later.
What was our ROI?
The tool's ROI is almost impossible to calculate because it's a security product. If nothing happens, then you always feel like you are paying too much, but you don't know how the situation would change if you use cheaper firewalls and have to face a security breach.
What's my experience with pricing, setup cost, and licensing?
The product's price is on the higher side but I also feel that it is more secure than the other solutions in the market.
Which other solutions did I evaluate?
In the past, my company had tested Fortinet and Sophos, but we did not migrate to them. Though the price of the firewalls from Fortinet and Sophos were better, from a security perspective, Check Point was better. In the recent years, there have been a lot of critical vulnerabilities detected in those firewalls and breaches because those vulnerabilities were detected and we didn't get them. So we value that greatly.
What other advice do I have?
The tool requires maintenance. You need to update the product version. If we don't encounter any bugs in the installation process, I would say that the maintenance process is quite straightforward.
I recommend the tool to others. If you value your data and it is a mission-critical project, then Check Point is the right choice.
I rate the tool an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Presales IT solutions at a consumer goods company with 1,001-5,000 employees
Monitors traffic well, is user-friendly and offers a good dashboard
Pros and Cons
- "The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events."
- "Timely updates to security databases, firmware, and software are crucial for addressing new threats."
What is our primary use case?
We are using the product in a small office to secure our network to configure the firewall settings to control incoming and outgoing traffic.
This includes setting up rules for allowing or blocking specific types of traffic.
We use intrusion prevention features to detect and prevent potential threats and attacks on your network.
It enables logging and monitoring features to keep track of network activity and identify potential security incidents.
With the solution, we can implement strong user authentication mechanisms to control access to your network resources.
How has it helped my organization?
The use of Check Point NGFW makes our business feel safer.
NGFWs typically include advanced threat prevention mechanisms, such as intrusion prevention systems (IPS), antivirus, anti-malware, and threat intelligence. These features help protect your network from a wide range of cyber threats.
NGFWs can integrate with user identity management systems, enabling more granular control over network access based on user identities. This is particularly important for enforcing security policies on a per-user basis.
What is most valuable?
The interface is user-friendly, and also they give you small training courses on the Coursera website to explain how to use the products.
The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events. This helps administrators get a snapshot of the network's security posture.
The ability to monitor network traffic and security events in real time is crucial. Check Point's interface often provides real-time visibility into network activity, making it easier to identify potential issues or threats.
What needs improvement?
Their products are pretty complete, and the explanations are very well done.
Check Point offers training and certification programs for administrators and security professionals. These programs help individuals develop the skills needed to effectively manage and secure networks using Check Point products.
Timely updates to security databases, firmware, and software are crucial for addressing new threats. Check Point's commitment to providing ongoing support ensures that organizations have access to assistance when needed.
For how long have I used the solution?
We have been using this solution for the last two years already.
What do I think about the stability of the solution?
The solution we use is pretty complete. For the moment, the stability is good enough for us.
What do I think about the scalability of the solution?
CkeckPoint has solutions for different sizes of companies. Therefore, the solution is scalable. The client has to choose the right solution for their needs. If you call the contact center, they can advise you on your options.
How are customer service and support?
We have not used technical support, up until now we haven't needed them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a normal antivirus on the endpoints previously. However, after we took a cybersecurity course, we understood that a bigger security solution was needed.
How was the initial setup?
The initial setup is easy. You just click through, next, next, next, and take some steps to make an account and do some basic setups. Everything basically works out of the box.
What about the implementation team?
We implemented the solution through a vendor team; they had well-trained technicians.
What was our ROI?
To feel safer in the online environment is the most important thing these days. Everything is online now. A solution like that makes it easier and safer for you to work and do things online.
What's my experience with pricing, setup cost, and licensing?
After researching what's available in the market, choose a product. Read reviews and watch demos to assess the user interface and learn what options the product offers.
Which other solutions did I evaluate?
We searched the market for months before we chose Check Point. There are many security solutions on the market, both for on-premises and on the cloud. We chose Check Point for the ease of use.
What other advice do I have?
The solution is perfect for us. That said, for each client, the needs are different.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
Check Point CloudGuard Network Security
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
















