Check Point offers excellent security.
Business Development Manager - Security at a computer software company with 201-500 employees
Excellent security solution that could be more user-friendly
Pros and Cons
- "Check Point offers excellent security."
- "Check Point is a bit difficult to use and manage so it would be nice to see some improvement in those areas."
What is most valuable?
What needs improvement?
Check Point is a bit difficult to use and manage so it would be nice to see some improvement in those areas.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution. We have about twenty customers that are using the solution currently.
Buyer's Guide
Check Point Quantum Force (NGFW)
August 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
How are customer service and support?
I have not needed to contact support.
How was the initial setup?
The initial setup was a bit complex only because there are no vendors to help with the installation requiring you to need to be trained.
Which other solutions did I evaluate?
Other competitors would be Fortinet and Palo Alto.
Check Point is more complex than Fortinet and less complicated than Palo Alto.
What other advice do I have?
I would recommend this solution to anyone with an eye for security and would rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Infrastructure Manager at trt18
Very good security especially where high bandwidth is needed
Pros and Cons
- "I use it as well as a VM. We use it a lot because we have all fiber optic connections, so we could use almost all of that. The federation is beautiful because I can transfer all traffic to my main site where I can use just one link to the internet, and I can use it as a proxy as well. It is good to keep control and security."
- "In terms of what could be improved, we have a cluster with two nodes and usually we have some problems when process gets really high and it has to choose which services it keeps going. I would like to have a better solution here, like if instead of just one we could use both at the same time. It would be good if it could work together. Then when one has a failure or something like that, the other one is there to transfer, to take all the services and keep working."
What is our primary use case?
I use the solution for VPN mostly, for the IDS and prevention and detection. I use it for security exploits, like HTTPS exploits.
I also use Check Point NGFW as a federation. I use it to connect to my other sites. We have five of them, mostly in cities where we need a high bandwidth.
What is most valuable?
I use it as well as a VM. We use it a lot because we have all fiber optic connections, so we could use almost all of that. The federation is beautiful because I can transfer all traffic to my main site where I can use just one link to the internet, and I can use it as a proxy as well. It is good to keep control and security.
What needs improvement?
In terms of what could be improved, we have a cluster with two nodes and usually we have some problems when process gets really high and it has to choose which services it keeps going. I would like to have a better solution here, like if instead of just one we could use both at the same time. It would be good if it could work together. Then when one has a failure or something like that, the other one is there to transfer, to take all the services and keep working. They have an integration between the nodes but I would like to use both of them working together. In the solution they could both be active, instead of active and passive. I would like them to add backup features to Check Point Firewall.
Many companies are going to the cloud. In future releases, it would be nice to have a cloud integration so we could work in a hybrid form for some years, like some services in the cloud and others on-premises. So it would be nice to have some features in this sense.
For how long have I used the solution?
I've been using Check Point NGFW since 2018. For two years now.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
I couldn't tell you about the scalability. I don't know. I know that we can use a federation, but I think it is scalable because we can buy additional licenses. As I mentioned, right now we have five working together, but we can buy until 50 or a 100, so I guess that it is scalable because you can keep increasing.
How was the initial setup?
The initial setup is hard. We came from another Cisco solution and even then it is hard, especially talking about the traffic. So we had to inspect the traffic and sometimes we had to do a lot of configurations. It would be nice if it was easier.
It took about three months to deploy.
It would be nice if it was easier to set up and to maintain.
What's my experience with pricing, setup cost, and licensing?
Right now we keep a contract with a company in Brazil, so we hardly talk to Check Point itself and we don't like it very much. In most cases we have to search and look into the database to really find the solution, so it could be better.
What other advice do I have?
I'd say that Check Point NGFW is a good product but it's hard to set up and keep it going, so we had to invest in some training and we have to keep at least two employees just to keep it working.
On a scale of one to ten, I would give Check Point NGFW an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
August 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Director at TechPlayr
Centralized architecture, with good support, but the scalability could be improved
Pros and Cons
- "We have not had any issues with the firewall."
- "Check Point can scale but at times we have experienced some issues."
What is our primary use case?
We deploy solutions for customers. We don't engage in buying.
We are both consultants and implementers.
What is most valuable?
We have not had any issues with the firewall.
Support is good and it's centralized architecture.
What needs improvement?
We are also working on load balancers. We don't have the option to work more with load balancers, we would like to see what else can come out of this in terms of security.
Technical support and scalability both require improvement.
For how long have I used the solution?
I have been working with Check Point NGFW for the last ten years.
What do I think about the scalability of the solution?
Check Point can scale but at times we have experienced some issues.
How are customer service and support?
Palo Alto is better compared to Check Point. I would rate Palo Alto as superior support to Fortinet or Check Point.
Which solution did I use previously and why did I switch?
We used to work with Fortinet for approximately five years, and the Palo Alto Appliances was some time back.
I believe the Palo Alto support is excellent, and it has more features than Fortinet. Many businesses, in my opinion, are choosing Palo Alto.
Palo Alto support is very good.
Fortinet's main issue is the support. We can't take it to the enterprise level because the Fortinet support is not very good.
What's my experience with pricing, setup cost, and licensing?
Check Point has previously held a large market share, but perhaps not recently. I think that the price point in India is a bit different. Check Point offers options. I don't see that Check Point is very high, but it is geared more towards enterprises.
Which other solutions did I evaluate?
We have evaluated Palo Alto Networks VM-Series to see what was available, and recently, I researched the Azure VM series to know how it worked.
What other advice do I have?
I'm leaning toward the now cloud. The appliance base has now been removed. We are now concentrating our efforts on the Azure Cloud, AWS, and other similar platforms. I believe that people must mature in order to work on it. That's where things stand. As a result, we must learn how this is implemented on cloud platforms.
I would rate Check Point a seven out of ten but NGFW a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Consultant at Capgemini
Easy to use and very complete with competitive pricing
Pros and Cons
- "While not being cheap, their pricing models are competitive."
- "There is no clear way to report incorrect classification to support and a business is neither happy nor forgiving when they cannot receive mail from a crucial business partner."
What is our primary use case?
It's a unified policy table that combines threat prevention and segmentation policies.
Smart Event allows consolidated event management and exporting features is very useful when we need to deal in reports, since, for some time now, everyone has been working from home and on the firewall from Check Point.
This function is implemented very conveniently and securely. The VPN over this firewall works as well as a standard VPN device. All in all, I'm delighted with their security solution. It is making configuring numerous layers of security policies easy to use and it always has been one of the things I liked most about their firewall solution.
How has it helped my organization?
Check Point firewalls are one of the most easy-to-use complete firewall solutions on the market. They protect our LANs against intruders, offer VPN for site-to-site connections, and haven't had a major issue in about 15 years.
While not being cheap, their pricing models are competitive.
A better approach to security focuses on prevention, blocking malware and other threats was difficult before they entered the network. By blocking the infection of “patient zero,” an NGFW with real-time prevention eliminates risk, damage, and cost to the organization.
What is most valuable?
It provides an SSL inspection facility. The SSL/TLS protocol improves the privacy and security of traffic by wrapping network communications in a layer of encryption and applying robust authentication. While this is a major benefit for data security, cyber threat actors also use SSL/TLS to conceal their activities on the network. An NGFW must go beyond signature-based detection to use technologies capable of detecting and remediating novel and zero-day threats.
Sandboxing (including static, dynamic, and behavioral analysis) is great.
What needs improvement?
It's nearly impossible to add an exception for threat prevention services - like antivirus and anti-bot. You will be stuck with Indicators of Compromise marked as detect only, caching issues, and random effects.
There is no clear way to report incorrect classification to support and a business is neither happy nor forgiving when they cannot receive mail from a crucial business partner.
The KBs article should also be improved as all the global KB articles do not provide all the activity steps related to every issue.
For how long have I used the solution?
I have been using this product for the last five years.
Which solution did I use previously and why did I switch?
I have not used any other product.
What's my experience with pricing, setup cost, and licensing?
The setup is very easy with minimal cost for licensing as well.
Which other solutions did I evaluate?
I have not used any other product.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
Great for content filtering and enabling anti-bots and IPS enabled security
Pros and Cons
- "The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution."
- "Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes."
What is our primary use case?
We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.
The solution addresses the Security requirements at Perimeter Layer including:
- Network IPS
- Application Control
- IPSEC VPN
- SSL VPN.
- Proxy
It was required to enable IPSEC VPN between our vendors across the world
We got positive responses on Check Point Firewalls from our vendors as well.
Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.
How has it helped my organization?
We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.
This solution addressed most of our needs but required multiple license subscriptions.
Below are the few Business use cases we achieved through Check Point NGFW:
- SSL VPN with Security Posture Assessment
- SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
- Content Filtering (Identity Awareness and DLP)
- Forward Proxy with Web and Application Control
- Enabling Anti-Bots and IPS
What is most valuable?
The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.
Anti-Bots and IPS enabled security on the network traffic.
Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.
The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.
What needs improvement?
It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.
We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B
Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.
We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.
Please concentrate on local services enablement for faster resolutions.
For how long have I used the solution?
We have been using this solution since July 2020.
What do I think about the stability of the solution?
Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.
What do I think about the scalability of the solution?
The solution is scalable in terms of enabling the features and deploying management servers.
How are customer service and support?
We would recommend they have regular feedback sessions with customers.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used another firewall that enables basic security features with lot of limitations.
How was the initial setup?
We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.
What about the implementation team?
Our In-house team handled the implementation.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.
Which other solutions did I evaluate?
We evaluated Palo Alto and FortiGate.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
System Administrator at Grant Thornton
Reliable with good central management capabilities and useful dynamic definitions
Pros and Cons
- "The solution offers very good central management, which saves time and is hassle-free."
- "There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus."
What is our primary use case?
We use the product as our main and only Firewall/Gateway/VPN Gateway. we are in the finance sector, and we need a very reliable and robust system.
We rely heavily on the VPN system, as most of our employees are working outside the office at this time.
We also have two appliances to improve reliability, we have internet access through two ISPs configured to work simultaneously.
Our internal LAN is with duplicated network nodes that are double connected to our Check Point cluster. That way, we have full High Availability.
How has it helped my organization?
Before our purchase of Check Point products, we used an open-source product that lacked good integration between products and setting up to work was very tricky.
We use the Check Point mobile VPN, which is very stable and easy to use. It allows our employees to change their internal domain password when it becomes old, even when they are outside of the office for a long time. The VPN client can connect to our internal network even before the user is logged into his laptop. This allows users to receive GPO policy updates.
What is most valuable?
The solution offers very good central management, which saves time and is hassle-free.
One of the most useful new feature is dynamic definitions. For example, if you need to allow all of the Microsoft Azure IP addresses, you can insert them dynamically and Check Point will update them for you. Without it, to find all IP addresses would be almost impossible.
You can create additional layers for the firewall rules. This allows better organization and performance of the product by skipping to the rules that are responsible for this group of protected devices.
What needs improvement?
There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus.
We would like to have a better search engine on the checkpoint.com site. Right now, it is difficult to find, for example, a newer version of the Check Point VPN Mobile client. The search engine shows most visited sites and the newer version won't be the most recently viewed site page. As it is right now, you have to find the general VPN page form, and from there you have to look at what version of the product you need and then go to the page of the latest version.
For how long have I used the solution?
We have been using this product for five years.
What do I think about the stability of the solution?
Check Point is very stable.
What do I think about the scalability of the solution?
We haven't needed to expand our throughput capacity.
However, based on the Check Point documentation, it is hyperscale ready capable of up to 475 Gbps of Threat Prevention.
How are customer service and support?
It is very good. Our local representatives are very helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We moved from a previous solution to Check Point as it is more reliable and easy to manage, and our old solution wasn't able to provide the level of security we desired.
How was the initial setup?
We have had some problems understanding how to set up HA, however, we managed to do it. This was mainly due to the fact that we didn't have experience with Check Point products in the past.
What about the implementation team?
We did everything in-house.
What's my experience with pricing, setup cost, and licensing?
New users should know that the first year of support is included in the equipment. After that, you have to buy it.
Which other solutions did I evaluate?
We choose between Palo Alto and Checkpoint.
What other advice do I have?
We like it. It works well.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Engineer at PricewaterhouseCoopers
Extremely reliable with a great SmartConsole and very useful Identity Awareness capabilities
Pros and Cons
- "One ability that Check Point has is that it is the first to provide us with the ability to use identities instead of using the traditional IP-based format, which allows way more flexibility in what we can do with the rule base."
- "Identity Awareness has been a massive source of problems for our deployment and the ability to debug it has been lacking."
What is our primary use case?
Our primary use case for Check Point NGFW is as our internal firewall within the datacenter to route traffic within it as well establishing our rulebase for part of our datacenter.
We have also implemented some other nodes as ICAP servers only. They have been a great replacement even though the installation was not the easiest.
They are the last line of defense (or first depending on how you look at it) within our perimeter and are therefore a critical part of our system within the company.
How has it helped my organization?
Check Point NGFW have been a real rock in terms of reliability (except for Identity Awareness) and we have not had any issues in terms of CPU or memory usage as our model might have been overkill with how well it is able to process traffic and how easy and unimpactful it is when adding new blades to manage this traffic
One ability that Check Point has is that it is the first to provide us with the ability to use identities instead of using the traditional IP-based format, which allows way more flexibility in what we can do with the rule base.
What is most valuable?
Identity Awareness has been an absolute gamechanger in how we've been able to create rules within the company. It allows us to give access to certain resources in very specific ways that were not possible before.
The SmartConsole is a very powerful interface compared to many other competiting products, which allows us to seamlessly go from watching logs, to modifying the rule base and easily find what objects are used where or even check which logs are linked to a specific rule
Logs are very well parsed when sent to Splunk.
What needs improvement?
Identity Awareness has been a massive source of problems for our deployment and the ability to debug it has been lacking.
The VPN setup is definitely way harder than it should be. The wizard or anything surrounding it doesn't allow for a quick setup without having to read documentation or actually getting a project with an external company
Our gateways have not felt like a day older than when we first got them, on the other hand, our physical management server Smart-1 has been definitely showing its age as it is sometimes quite long to do anything on SmartConsole when it decides to act up.
For how long have I used the solution?
I have been using Check Point since joining my current workplace - about 4 years ago.
What do I think about the stability of the solution?
In 4 years, we've only really had one big incident with availability that was due to a faulty network card, which was changed quickly once diagnosed.
What do I think about the scalability of the solution?
Since we chose a model larger than our needs, we aren't looking for a scalable solution.
How are customer service and support?
Customer service and support have been a bit hit or miss and it takes a while for escalation to happen, however, once it does happen, you get proper support right away.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I was not present within the company when it was decided to switch from one solution to another, and actually our previous solution was Check Point as well - and it was just reaching its end of support.
How was the initial setup?
I did not participate in the setup.
What about the implementation team?
We used a vendor team along with our in-house team.
What was our ROI?
I would need to compare it with other solutions used in our environment, which I haven't done.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to only choose blades when they are absolutely necessary - unless getting a good deal with a package.
Which other solutions did I evaluate?
As mentioned, we switched from Check Point to Check Point.
What other advice do I have?
For the Identity Awareness setup, try to follow Check Point guidelines from the start as it is really capricious and hard to debug.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Snr Information Security Analyst at The Toronto Star
Great compliance with good application control and a robust IPS blade
Pros and Cons
- "We can easily check firewall configurations against any compliance standard."
- "Support for customers really needs to improve."
What is our primary use case?
Check Point firewall is used as edge protection.
Traffic to the internet and from the internet does go through the firewall where IPS, URL, and app policies are applied.
Check Point was also used as an internal firewall to segment traffic between the data center and the user network. Basically, all traffic from any user will have to be inspected by an internal Check Point firewall before any server is accessed.
Check Point is also used for PCI-DSS credit card checks within any email sent or received. This is effective in detecting credit card numbers within any email sent by a user in error and blocks that from being exposed.
How has it helped my organization?
The product has improved visibility into the traffic going through our network.
For all traffic leaving the network, Check Point provides the capability to inspect and permit traffic using not just ports but application IDs, which is more secure than simply permitting TCP/UDP.
Check Point has a robust IPS Blade which has added an additional layer of security on connections to the data center.
Check Point's compliance blade also helps in checking how Check Point's appliance configuration is in compliance with any requirement that we need to provide evidence for.
What is most valuable?
Check Point application control is very useful. This blade detects traffic and provides the ability to grant access based on the application and not the port as TCP/UDP can easily grant access for more than what's required.
The Check Point compliance model is also great. We can easily check firewall configurations against any compliance standard. It has made it easy to provide evidence and reports.
Check Point integrates with third-party user directories such as Microsoft Active Directory. The dynamic, identity-based policy provides granular visibility and control of users, groups, and machines and is easier to manage than static, IP-based policy.
What needs improvement?
Support for customers really needs to improve.
Check Point also needs to create a study license that will enable the customer to install a firewall (maybe with reduced connectivity) for a bit longer so that one can simulate scenarios without having to re-install it every 15 days.
We had a lot of problems with the VPN blade on the solution. We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release.
Check Point needs to create a certification program that involves practical applications.
For how long have I used the solution?
I've used the Check Point firewall for three years.
How are customer service and support?
Customer service really needs to improve.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Cisco ASA for Internet-facing Web applications, however, Check Point was used at the EDGE ( all user traffic to the internet), internal firewall ( all user traffic to datacenter), all internet traffic to PCI-DSS applications instead.
What about the implementation team?
Implementation was done with the help of Check Point's professional services.
What's my experience with pricing, setup cost, and licensing?
If you have the budget, it's a good idea to go for the Check Point Firewall.
Which other solutions did I evaluate?
We also evaluated Palo Alto.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?