Try our new research platform with insights from 80,000+ expert users
reviewer1717920 - PeerSpot reviewer
Cyber Security Consultant at Capgemini
Real User
Easy to use and very complete with competitive pricing
Pros and Cons
  • "While not being cheap, their pricing models are competitive."
  • "There is no clear way to report incorrect classification to support and a business is neither happy nor forgiving when they cannot receive mail from a crucial business partner."

What is our primary use case?

It's a unified policy table that combines threat prevention and segmentation policies. 

Smart Event allows consolidated event management and exporting features is very useful when we need to deal in reports, since, for some time now, everyone has been working from home and on the firewall from Check Point. 

This function is implemented very conveniently and securely. The VPN over this firewall works as well as a standard VPN device. All in all, I'm delighted with their security solution. It is making configuring numerous layers of security policies easy to use and it always has been one of the things I liked most about their firewall solution.

How has it helped my organization?

Check Point firewalls are one of the most easy-to-use complete firewall solutions on the market. They protect our LANs against intruders, offer VPN for site-to-site connections, and haven't had a major issue in about 15 years. 

While not being cheap, their pricing models are competitive. 

A better approach to security focuses on prevention, blocking malware and other threats was difficult before they entered the network. By blocking the infection of “patient zero,” an NGFW with real-time prevention eliminates risk, damage, and cost to the organization.

What is most valuable?

It provides an SSL inspection facility. The SSL/TLS protocol improves the privacy and security of traffic by wrapping network communications in a layer of encryption and applying robust authentication. While this is a major benefit for data security, cyber threat actors also use SSL/TLS to conceal their activities on the network. An NGFW must go beyond signature-based detection to use technologies capable of detecting and remediating novel and zero-day threats.  

Sandboxing (including static, dynamic, and behavioral analysis) is great.

What needs improvement?

It's nearly impossible to add an exception for threat prevention services - like antivirus and anti-bot. You will be stuck with Indicators of Compromise marked as detect only, caching issues, and random effects. 

There is no clear way to report incorrect classification to support and a business is neither happy nor forgiving when they cannot receive mail from a crucial business partner. 

The KBs article should also be improved as all the global KB articles do not provide all the activity steps related to every issue.

Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I have been using this product for the last five years.

Which solution did I use previously and why did I switch?

I have not used any other product.

What's my experience with pricing, setup cost, and licensing?

The setup is very easy with minimal cost for licensing as well.

Which other solutions did I evaluate?

I have not used any other product.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1260276 - PeerSpot reviewer
Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
Real User
Top 10
Great for content filtering and enabling anti-bots and IPS enabled security
Pros and Cons
  • "The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution."
  • "Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes."

What is our primary use case?

We wanted to deploy a specialized Next-Generation Firewall in our perimeter security.

The solution addresses the Security requirements at Perimeter Layer including:

  1. Network IPS
  2. Application Control
  3. IPSEC VPN
  4. SSL VPN.
  5. Proxy

It was required to enable IPSEC VPN between our vendors across the world

We got positive responses on Check Point Firewalls from our vendors as well.

Our team addresses the regular audits with a Next-Generation Firewall, starting from configuration and application vulnerabilities to customized reporting.

How has it helped my organization?

We have planned to achieve many business use cases including IPS, Network AV, Content Awareness - Data Leakage Prevention, IPSEC VPNs between our peers, SSL VPN with Posture Assessment, and Web Proxy as well.

This solution addressed most of our needs but required multiple license subscriptions.

Below are the few Business use cases we achieved through Check Point NGFW:

  1. SSL VPN with Security Posture Assessment
  2. SSL VPN with In-build Multi-Factor Authentication Option (Certificate + User Credentials)
  3. Content Filtering (Identity Awareness and DLP)
  4. Forward Proxy with Web and Application Control
  5. Enabling Anti-Bots and IPS

What is most valuable?

The SSL VPN with posture assessment helped us to remove the dedicated Standalone SSL VPN solution which was benefited both commercially and technically.

Anti-Bots and IPS enabled security on the network traffic.

Along with VPN and Proxy (Web and application control), we removed another standalone proxy for internal use and extended the content filtering to roaming users as well.

The security posture assessment with two-factor authentication has saved more time and commercial costs by avoiding deploying having to deploy another solution.

What needs improvement?

It took so many weeks to migrate our old firewall to Check Point after we did internal and external assessments on earlier setups and enabled multiple security features.

We had difficulty configuring the NAT. For example, instead of following A-B-C, we need to do A-C-B

Initially, we faced a few challenges with firmware. Later this was addressed with jumbo hotfixes.

We tried to create a single management software to manage the policies, view the logs, have a mobile access VPN, and do reporting.

Please concentrate on local services enablement for faster resolutions.

For how long have I used the solution?

We have been using this solution since July 2020.

What do I think about the stability of the solution?

Initially, we faced a few challenges with the firmware. We later addressed this with help of jumbo and custom hotfixes. Later, it performed well.

What do I think about the scalability of the solution?

The solution is scalable in terms of enabling the features and deploying management servers.

How are customer service and support?

We would recommend they have regular feedback sessions with customers.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We used another firewall that enables basic security features with lot of limitations.

How was the initial setup?

We found the setup difficult in the earlier stages as our team used to work with another CLI-based solution.

What about the implementation team?

Our In-house team handled the implementation. 

What's my experience with pricing, setup cost, and licensing?

I'd advise users to validate the licensing model during the pre-evaluation period itself. It took a few days for us to understand DLP and Mobile Access Blades that had to be procured separately along with the NGTP bundle to address our requirements.

Which other solutions did I evaluate?

We evaluated Palo Alto and FortiGate.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
System Administrator at Grant Thornton
Real User
Reliable with good central management capabilities and useful dynamic definitions
Pros and Cons
  • "The solution offers very good central management, which saves time and is hassle-free."
  • "There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus."

What is our primary use case?

We use the product as our main and only Firewall/Gateway/VPN Gateway. we are in the finance sector, and we need a very reliable and robust system. 

We rely heavily on the VPN system, as most of our employees are working outside the office at this time. 

We also have two appliances to improve reliability, we have internet access through two ISPs configured to work simultaneously. 

Our internal LAN is with duplicated network nodes that are double connected to our Check Point cluster. That way, we have full High Availability.

How has it helped my organization?

Before our purchase of Check Point products, we used an open-source product that lacked good integration between products and setting up to work was very tricky.

We use the Check Point mobile VPN, which is very stable and easy to use. It allows our employees to change their internal domain password when it becomes old, even when they are outside of the office for a long time. The VPN client can connect to our internal network even before the user is logged into his laptop. This allows users to receive GPO policy updates. 

What is most valuable?

The solution offers very good central management, which saves time and is hassle-free.

One of the most useful new feature is dynamic definitions. For example, if you need to allow all of the Microsoft Azure IP addresses, you can insert them dynamically and Check Point will update them for you. Without it, to find all IP addresses would be almost impossible.

You can create additional layers for the firewall rules. This allows better organization and performance of the product by skipping to the rules that are responsible for this group of protected devices.

What needs improvement?

There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus.

We would like to have a better search engine on the checkpoint.com site. Right now, it is difficult to find, for example, a newer version of the Check Point VPN Mobile client. The search engine shows most visited sites and the newer version won't be the most recently viewed site page. As it is right now, you have to find the general VPN page form, and from there you have to look at what version of the product you need and then go to the page of the latest version.

For how long have I used the solution?

We have been using this product for five years.

What do I think about the stability of the solution?

Check Point is very stable.

What do I think about the scalability of the solution?

We haven't needed to expand our throughput capacity.
However, based on the Check Point documentation, it is hyperscale ready  capable of up to 475 Gbps of Threat Prevention.

How are customer service and support?

It is very good. Our local representatives are very helpful.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We moved from a previous solution to Check Point as it is more reliable and easy to manage, and our old solution wasn't able to provide the level of security we desired.

How was the initial setup?

We have had some problems understanding how to set up HA, however, we managed to do it. This was mainly due to the fact that we didn't have experience with Check Point products in the past.

What about the implementation team?

We did everything in-house.

What's my experience with pricing, setup cost, and licensing?

New users should know that the first year of support is included in the equipment. After that, you have to buy it.

Which other solutions did I evaluate?

We choose between Palo Alto and Checkpoint.

What other advice do I have?

We like it. It works well.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1728645 - PeerSpot reviewer
IT Security Engineer at PricewaterhouseCoopers
Real User
Extremely reliable with a great SmartConsole and very useful Identity Awareness capabilities
Pros and Cons
  • "One ability that Check Point has is that it is the first to provide us with the ability to use identities instead of using the traditional IP-based format, which allows way more flexibility in what we can do with the rule base."
  • "Identity Awareness has been a massive source of problems for our deployment and the ability to debug it has been lacking."

What is our primary use case?

Our primary use case for Check Point NGFW is as our internal firewall within the datacenter to route traffic within it as well establishing our rulebase for part of our datacenter.

We have also implemented some other nodes as ICAP servers only. They have been a great replacement even though the installation was not the easiest.

They are the last line of defense (or first depending on how you look at it) within our perimeter and are therefore a critical part of our system within the company.

How has it helped my organization?

Check Point NGFW have been a real rock in terms of reliability (except for Identity Awareness) and we have not had any issues in terms of CPU or memory usage as our model might have been overkill with how well it is able to process traffic and how easy and unimpactful it is when adding new blades to manage this traffic

One ability that Check Point has is that it is the first to provide us with the ability to use identities instead of using the traditional IP-based format, which allows way more flexibility in what we can do with the rule base.

What is most valuable?

Identity Awareness has been an absolute gamechanger in how we've been able to create rules within the company. It allows us to give access to certain resources in very specific ways that were not possible before.

The SmartConsole is a very powerful interface compared to many other competiting products, which allows us to seamlessly go from watching logs, to modifying the rule base and easily find what objects are used where or even check which logs are linked to a specific rule

Logs are very well parsed when sent to Splunk.

What needs improvement?

Identity Awareness has been a massive source of problems for our deployment and the ability to debug it has been lacking.

The VPN setup is definitely way harder than it should be. The wizard or anything surrounding it doesn't allow for a quick setup without having to read documentation or actually getting a project with an external company

Our gateways have not felt like a day older than when we first got them, on the other hand, our physical management server Smart-1 has been definitely showing its age as it is sometimes quite long to do anything on SmartConsole when it decides to act up.

For how long have I used the solution?

I have been using Check Point since joining my current workplace - about 4 years ago.

What do I think about the stability of the solution?

In 4 years, we've only really had one big incident with availability that was due to a faulty network card, which was changed quickly once diagnosed.

What do I think about the scalability of the solution?

Since we chose a model larger than our needs, we aren't looking for a scalable solution.

How are customer service and support?

Customer service and support have been a bit hit or miss and it takes a while for escalation to happen, however, once it does happen, you get proper support right away.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I was not present within the company when it was decided to switch from one solution to another, and actually our previous solution was Check Point as well - and it was just reaching its end of support.

How was the initial setup?

I did not participate in the setup.

What about the implementation team?

We used a vendor team along with our in-house team.

What was our ROI?

I would need to compare it with other solutions used in our environment, which I haven't done.

What's my experience with pricing, setup cost, and licensing?

I'd advise users to only choose blades when they are absolutely necessary - unless getting a good deal with a package.

Which other solutions did I evaluate?

As mentioned, we switched from Check Point to Check Point.

What other advice do I have?

For the Identity Awareness setup, try to follow Check Point guidelines from the start as it is really capricious and hard to debug.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1720029 - PeerSpot reviewer
Snr Information Security Analyst at The Toronto Star
User
Great compliance with good application control and a robust IPS blade
Pros and Cons
  • "We can easily check firewall configurations against any compliance standard."
  • "Support for customers really needs to improve."

What is our primary use case?

Check Point firewall is used as edge protection.

Traffic to the internet and from the internet does go through the firewall where IPS, URL, and app policies are applied.

Check Point was also used as an internal firewall to segment traffic between the data center and the user network. Basically, all traffic from any user will have to be inspected by an internal Check Point firewall before any server is accessed.

Check Point is also used for PCI-DSS credit card checks within any email sent or received. This is effective in detecting credit card numbers within any email sent by a user in error and blocks that from being exposed. 

How has it helped my organization?

The product has improved visibility into the traffic going through our network.

For all traffic leaving the network, Check Point provides the capability to inspect and permit traffic using not just ports but application IDs, which is more secure than simply permitting TCP/UDP.

Check Point has a robust IPS Blade which has added an additional layer of security on connections to the data center.

Check Point's compliance blade also helps in checking how Check Point's appliance configuration is in compliance with any requirement that we need to provide evidence for.

What is most valuable?

Check Point application control is very useful. This blade detects traffic and provides the ability to grant access based on the application and not the port as TCP/UDP can easily grant access for more than what's required.

The Check Point compliance model is also great. We can easily check firewall configurations against any compliance standard. It has made it easy to provide evidence and reports.

Check Point integrates with third-party user directories such as Microsoft Active Directory. The dynamic, identity-based policy provides granular visibility and control of users, groups, and machines and is easier to manage than static, IP-based policy.

What needs improvement?

Support for customers really needs to improve.

Check Point also needs to create a study license that will enable the customer to install a firewall (maybe with reduced connectivity) for a bit longer so that one can simulate scenarios without having to re-install it every 15 days.

We had a lot of problems with the VPN blade on the solution. We sometimes have trouble with the performance of the solution. Maybe some performance tuning options could be added in a future release.

Check Point needs to create a certification program that involves practical applications. 

For how long have I used the solution?

I've used the Check Point firewall for three years.

How are customer service and support?

Customer service really needs to improve.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Cisco ASA for Internet-facing Web applications, however, Check Point was used at the EDGE ( all user traffic to the internet), internal firewall ( all user traffic to datacenter), all internet traffic to PCI-DSS applications instead.

What about the implementation team?

Implementation was done with the help of Check Point's professional services.

What's my experience with pricing, setup cost, and licensing?

If you have the budget, it's a good idea to go for the Check Point Firewall.

Which other solutions did I evaluate?

We also evaluated Palo Alto.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1721658 - PeerSpot reviewer
Network administrator at IHSS
User
Good security management with great anti-malware and a helpful sandbox feature
Pros and Cons
  • "The performance has been very good."
  • "The anti-spam needs improvement."

What is our primary use case?

This is the perimeter firewall and manages all security facing towards the internet,

It's a distributed solution composed of a Security Gateway and a Security Manager. It controls all the traffic from the LAN to the Internet and the VPN tunnels for connections with external partners. We control the traffic to the internet with blades as URL filtering to manage the bandwidth, limit the use of this resource, and apply the security policies as well as protect the LAN network against advanced threats from the internet to the servers and PCs. 

How has it helped my organization?

This solution applies NGFW features to the inside and outside traffic of the networks. The other options did not have sandboxing, reports, and the same advantages as Check Point.

We have a small firewall from another vendor. The solution is working with limitations, as it was designed with Check Point as a security solution for the perimeter with more security features for covering our network requirements and specifications and preventing advanced threats from the internet to our servers and PCs. 

What is most valuable?

The sandbox feature is great.

The Sandblast blade is a very powerful solution that works against archives infected with ransomware.

The anti-malware is quite effective as many applications can be infected with any kind of malware with the goal of interrupting the productivity of our work equipment.

The reporting is great.

With this solution, we have had many kinds of logs and a very friendly way to view them. Now can we know what is happening within the network's traffic.

The performance has been very good. 

This security solution has grown more options and has expanded slots, including RAM slots, Optical Fiber slots, and various other features.

What needs improvement?

The anti-spam needs improvement.

A weakness with the Check Point solutions is the anti-spam, as they have a partnership with some solutions for anti-spam. They should have their own solution. We have email provided through Office 365 and they have their own way to fight spam and, due to this, we haven't bothered looking into anti-spam options. That said, Check Point is the most adapted to our necessities.

I consider the price of this solution high. It is very good, however, the prices are high - it's like buying a car.

For how long have I used the solution?

I've been using the solution since 2018.

Which solution did I use previously and why did I switch?

We changed from an older solution as it worked for five years and was old. It wasn't equipped for the new generation threats.

What's my experience with pricing, setup cost, and licensing?

The price should be considered, however, it shouldn't be the only reason you choose the solution, or not.

Which other solutions did I evaluate?

We also evaluated WatchGuard, Palo Alto, and FortiGate.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1721637 - PeerSpot reviewer
Integration engineer at S21sec
User
Great technical support, adapts well to any environment, and works well with Linux
Pros and Cons
  • "The technical services always replied in a very fast and effective way."
  • "One thing to improve is the VSX gateway. It is quite complex to work with VSX and they are quite easy to break if you aren't familiar with them."

What is our primary use case?

We use the product to secure our network, using all Check Point has to offer, including multi-domain servers, centralized log servers, gateways on-premise, and VSX. It has improved a lot with the last versions making day-to-day operations very user-friendly. 

I have used almost all the blades Check Point has and it's incredible what a Next-Generation firewall is capable of, including VPN, IPS, monitoring, mobile access, compliance, and more. The reports of the Smart Event console are also very useful. It's good to have a view of what's going on in our network. 

Since Check Point has Linux working on them, it gives us plenty of tools to adapt to any specific need we have.

How has it helped my organization?

In actuality, Firewalls are a must in any organization. Check Point's ability to adapt to any environment is their strength. The interface is very easy to understand, and the Smart Console can be configured to fit almost anything you need to.

When an issue appears, the logs are very easy to read, and that helps to identify the reason for the problem and solves it faster. The issues are not so annoying. 

What is most valuable?

The support Check Point gives is key. As the Firewall vendor, I recommend them. It's always great to work with them. For this reason, I am very satisfied with Check Point. Every doubt I had they were pleased to help with and we ab;e to provide a resolution. The technical services always replied in a very fast and effective way. The live chat is great as well. There is always someone willing to help. This makes working with Check Point a good experience.

Check Point expert mode is basically Linux, so working with that allows us to implement a variety of scripts.

What needs improvement?

In earlier versions, it was a bit hard to do migrations of Multi-Domain Servers/CMAs, nowadays, with +R80.30 it has gotten much easier. I cannot really think of many things to improve. 

One thing that could be useful is to have a website to analyze CP Infos. This way, it would be much faster to debug problems or check configurations. 

Another thing not very annoying but enough to comment on is when preparing a bootable UBS with the ISOMorphic (Check Point's bootable USB tool), it gives the option to attach a Hotfix. However, this usually causes corrupted ISO installations.

One thing to improve is the VSX gateway. It is quite complex to work with VSX and they are quite easy to break if you aren't familiar with them.

For how long have I used the solution?

I've used the solution for three years.

What do I think about the stability of the solution?

With other products, I have used quite a lot of RMAs, usually for not the most important component, however, enough to need an RMA, such as FANs or PSUs.

With Check Point it's quite easy, if it's needed, to replace. You just install the correct version and hotfix and load a backup from the old device. After that, the new device is ready to go.

What do I think about the scalability of the solution?

The scalability of Check Point is great. With the usage of Multi-Domain Servers, you can integrate all the devices into one console. You also always have the chance to expand creating new domains. Also, this distribution helps to have a very structured and organized management. It is always a very good thing when things don't go as expected and you need to solve any problem. Finding where the issue is in your organization is key.

How are customer service and support?

The technical cases are replied to in a very fast and effective way. The live chat means there is always someone willing to help. This makes working with Check Point a good experience.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The most I have used are Forcepoint, Cisco, F5, FortiGate, and Palo Alto.

How was the initial setup?

The initial setup is very straightforward and very guided. 

What was our ROI?

With the few replacements we need to do, there is very little downtime. It is worth the investment. The great support team behind Check Point is also worth the cost.

What's my experience with pricing, setup cost, and licensing?

Check Point is not the cheapest manufacturer, however, it's worth the price.

Which other solutions did I evaluate?

I have been always on the side of Check Point, however, Palo Alto was another option we considered.

What other advice do I have?

Having the option to use a UNIX-based shell instead of being forced to use GAIA, in this case, is great. It makes Check Point very customizable.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1724520 - PeerSpot reviewer
System Engineer at Infosys
Vendor
User-friendly with a great Smart Console and easy management capabilities
Pros and Cons
  • "Everything is easily managed through their Smart Console dashboard. It's a very easy-to-understand dashboard that provides a detailed view."
  • "While not being cheap, their pricing models are competitive. In the pricing structure, however, they need improvement."

What is our primary use case?

The Check Point firewall is a reliable perimeter security product. Check Point gives me access to explore various security features in a single box (loaded with all features that an organization needs most). 

I can say I have been using it for one year and getting a grip on it and I will always try to implement it wherever it is required. 

When it comes to Check Point, there are great security features and a marvelous inbuilt design that caters to handling all threats, including zero-day attacks and perimeter security. I really like the user-friendly interface of the Smart Console dashboard and the maximum security is integrated.

How has it helped my organization?

The intruder blocking real-time is a great feature that does not even require policy installation or committing to something. This feature enables real-time attack mitigation along with full security access which helps our organization to improve its security factors. 

IPS detection is a big plus for me since it deeply scans the packet. 

URL fileting along with application control gives me the access to manage the least privilege to maximum rights on a single click.

What is most valuable?

The product provides multiple security layers that build upon each other, from the traditional security policy that is IP and port-based to application security, intrusion prevention, and their latest sandblast cloud-based malware detection. 

Everything is easily managed through their Smart Console dashboard. It's a very easy-to-understand dashboard that provides a detailed view. Check Point helps to resolve a lot of problems, such as showing our organization all known threats. 

It is easy to deploy and manage. 

The product offers a simple Web User Interface.

What needs improvement?

While not being cheap, their pricing models are competitive. In the pricing structure, however, they need improvement. 

I would love to see an SSL offloading feature that is not there right now. I am following many forums related to Check Point and it seems like they are going to launch it very soon. SSL Offloading will be very helpful for NBFC and for financial institutes.'

The Check Point NGFW OS is a historically grown OS. It has been on the market for a long time and has many releases. It is a very complex system. All features are done in software - no extra hardware chips are installed.

For how long have I used the solution?

I have been using this solution for almost a year.

What do I think about the stability of the solution?

This solution is one of the best solutions in terms of stability.

What do I think about the scalability of the solution?

It is highly scalable.

Which solution did I use previously and why did I switch?

I have been using this solution from the start as it was recommended by my organization.

What's my experience with pricing, setup cost, and licensing?

The pricing is a little bit high, although I have no issue with the licensing or setup. It is easy to use.

Which other solutions did I evaluate?

I have stuck to this solution as I read reviews before and it was all positive in regards to Check Point NGFW. I did not use a different solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.