The Check Point firewalls are used to protect both the edge and datacenter firewall environment.
The firewalls have been deployed in a high availability design and are virtualized using Check Point VSX VSLS. This means we have multiple virtual firewalls protecting different parts of the data center (e.g., DB, Edge, WAN, pre-production.)
We have activated multiple software blades, including firewall, VPN, URL filtering, Application Control, compliance, reporting, and threat emulation, to name a few.
A similar design has been deployed at the DR with a similar set of firewalls.
The following has been improved:
1) The edge security posture has greatly improved. We are now able to detect and prevent threats coming from the public internet. The firewall is able to block know threats using the inbuild Intrusion Prevention blades.
2) We can connect with other organizations using site-to-site VPNs to enable inter-organization communication.
3) Check Point comes with a strong management solution that allows us to monitor and track threats that are detected and prevented. It also helps us be in compliance with industry standards.
The following features have been valuable:
1) IPS - The edge security posture has dramatically improved as we can now detect and prevent threats from the public internet. The firewall can block know threats using the inbuild Intrusion Prevention blades.
2) VPN - We can connect with other organizations using site-to-site VPNs for inter-organization communication.
3) Management Blades - Check Point comes with a strong management solution that allows us to monitor and track detected and prevented threats. It also helps us be in compliance with industry standards.
The following can be improved:
1) The management solution is currently using a desktop client for administration purposes. This should be improved by ensuring configuration on the firewalls can be done 100% using a web-based approach. This is currently a work in progress in R81.X, yet should be fast-tracked.
2) The Check Point TAC support has, in recent years, deteriorated. Getting support is usually a pain as the TAC engineers don't seem to understand our issues fast enough and are not readily available. This is in contrast to the amount of money paid for the support.
I've used the solution for five years.
A lot of improvement is required in how checkpoint TAC engineers handle their assigned cases. Tickets can be opened for very long without clear solutions.
We previously used Cisco ASA 5585 Firewall.
The setup was fairly easy as the team is well trained.
We worked with Check Point professional services.
This is a premium enterprise product, hence the price is very high.
Check Point should review their pricing models especially for the African market.