Try our new research platform with insights from 80,000+ expert users
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Mar 2, 2021
Easy to control from the central management system, providing us time savings
Pros and Cons
  • "It is easy to control from the central management system. For example, if we have 10 firewalls, and we want to push that same configuration among them, we can use this solution's central management system to do that simultaneously. So, there is time saving in that way. The time savings does depend on the situation. For example, if I am running half an hour of work on each firewall, that will take around 300 minutes. However, if I do this work from the central management system, then it will only take 30 minutes to push the same configuration to those same 10 devices."
  • "While the logs are very good and easy to understand, when you want to download these customized logs, they don't have as many features compared to competitive firewalls."

What is our primary use case?

I work as an internal network team member. We protect the company environment from outside threats, outside viruses, and ransomware attacks. It is kind of an IT administrator job.

They are protecting internal security as well as giving us security from the outside world or public environment. 

How has it helped my organization?

It protects the environment. It gives advanced features to our company, like Antivirus, more granular security policies, and more control over the traffic, e.g., what we want to allow or deny to our environment. 

What is most valuable?

What I like about this firewall is it has a central management system. We can configure or monitor a number of firewalls at a time from the central management system. 

They have a logging system where we can have our logs visible. The logs are easy to view and understand. 

What needs improvement?

While the logs are very good and easy to understand, when you want to download these customized logs, they don't have as many features compared to competitive firewalls. 

Check Point has a very good Antivirus feature. However, compared to the competition in the market, it is lacking somewhere. In my last organization, I worked with Palo Alto Networks as well. I found that while they both have an antivirus feature, the Palo Alto antivirus feature is much better. Check Point should improve this feature. It is a good feature, but compared to Palo Alto, it lacks.

Buyer's Guide
Check Point Quantum Force (NGFW)
February 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for the last three years, since 2017.

What do I think about the stability of the solution?

Check Point is already a very big name in the market. Our software updates, even the Antivirus updates, are very stable in the market. There are no problems with its stability.

Performing maintenance for a solution takes around 12 people. Maintenance is something that our team is capable of. Internally, we have had many training sessions on Check Point Firewall. Our seniors have managed that for us so we are capable of doing it. Most of our BAU is done by us.

What do I think about the scalability of the solution?

Scalability is very easy. I haven't found anything that is the issue with the scalability of this firewall. If you have complete knowledge of it, the scalability is not tough.

How are customer service and support?

I used their assistance many times. The experience with them is sometimes very good. They give the best solution in a short amount of time. Two out of 10 times, I feel that they are only looking to close their tickets. They are keen to do that. My personal experience with the support is an eight out of 10.

Which solution did I use previously and why did I switch?

We currently use Check Point and Cisco ASA. The purpose for the company is to increase the security. They were only using Cisco ASA Firewall, which is kind of a degrading firewall right now because it lacks many features, which are advanced in Check Point Firewall. With Cisco ASA, we need to purchase additional IPS hardware. But, for Check Point, we do not require that. Also, if we want the same configuration for multiple firewalls at a time, then Cisco ASA does not support that. We have to create the same policy in each firewall.

How was the initial setup?

We have our own on-premises firewalls, not cloud-based. The production time took around nine to 12 months' time. The setup was completed during this time.

We follow the three-tier architecture for this firewall, which is also recommended by Check Point. We have the central management device as well as the web console and firewall.

What about the implementation team?

For the deployment process, there were only four senior network engineers involved from our company.

What was our ROI?

It is easy to control from the central management system. For example, if we have 10 firewalls, and we want to push that same configuration among them, we can use this solution's central management system to do that simultaneously. So, there is time saving in that way. The time savings does depend on the situation. For example, if I am running half an hour of work on each firewall, that will take around 300 minutes. However, if I do this work from the central management system, then it will only take 30 minutes to push the same configuration to those same 10 devices.

What's my experience with pricing, setup cost, and licensing?

They sell it in one box. In that one box, they sell Antivirus and Threat Prevention. They have everything, so we are not required to purchase additional IPS hardware for it.

The cost of the pricing and licensing are okay. They are giving me a good product as far as I know. It is more expensive than Cisco, but cheaper than Palo Alto, which is fine. It has many good features, so it deserves a good price as well.

Which other solutions did I evaluate?

I have experience with Palo Alto Networks Firewalls and Cisco ASA Firewall. Compared to these solutions, Check Point has a very good, understandable log viewer. It is easy to view and understand the logs, which helps a lot while doing troubleshooting or making new security policies for the organization. Also, it is very easy to create new security policy rules.

The Check Point Antivirus feature lacks in comparison to Palo Alto Networks. Also, compared to other competitive solutions, the training for Check Point available right now is very expensive as well as the certification is little expensive.

What other advice do I have?

Get properly trained. When I entered this organization, I struggled with this firewall. There are very few good quality training programs available in the market. Or, if it is available, then it is very expensive. So, I advise new people to get properly trained because it has many feature sets, and if they do not use them with the proper knowledge, then it could worsen their situation.

I am happy with the organization's progress, as they work hard on their product. It is a good lesson from a personal level: We should work hard and improve ourselves. 

I would rate this solution as a nine out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Nov 25, 2025
Nice portal, good security, and great dashboards
Pros and Cons
  • "The solution is easy to administer thanks to its dashboards. The monitoring is really useful."
  • "Currently, some prices are very expensive."

What is our primary use case?

We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop.

Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.

How has it helped my organization?

Thanks to Check Point, we managed to carry out a better security implementation. By placing one in a workshop, we managed to solve issues with attacks and malware.

The solution is easy to administer thanks to its dashboards. The monitoring is really useful.

What is most valuable?

The most valuable aspects include:

  • Mobile security. Check Point NGFW includes mobile security features that enable you to secure mobile devices and protect against threats such as mobile malware and phishing attacks.
  • Scalability: Check Point NGFW is highly scalable and can support large networks with high traffic volumes. 
  • What needs improvement?

    The best improvements to be considered are:

    • Improvements in the time and attention given to solutions for generated cases.
    • Licensing that is more comfortable and affordable. Currently, some prices are very expensive.
    • In terms of language in the application, they could better facilitate the handling of others.

    For how long have I used the solution?

    This is an excellent product of the new generation, administered in the Infinity Portal. We have used the product for at least two years.

    Which solution did I use previously and why did I switch?

    Previously, we had not carried out verifications of other devices.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Nov 25, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Quantum Force (NGFW)
    February 2026
    Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
    881,757 professionals have used our research since 2012.
    reviewer1986231 - PeerSpot reviewer
    Senior Network Security Engineer at a consultancy with 10,001+ employees
    Vendor
    Top 20
    Apr 3, 2024
    Granular with good visibility but needs better training options
    Pros and Cons
    • "It is easy to administrate and maintain."
    • "There needs to be advanced troubleshooting."

    What is our primary use case?

    I've been dealing with the Check Point environment for over eight years, ever since SPLAT, the R75 versions, and mainly with a multi-domain management (former Provider1) set-up. I also use the Smart Management Server, with a standalone/distributed deployment.

    I'm currently engaged in the design, implementation, and maintenance of a large-scale Check Point firewall environment (~100 GWs).

    Presently, the customer is using Check Point for perimeter security, IPS, threat prevention, encrypted traffic, as well as access to the internet, and multi-domain server architecture.

    How has it helped my organization?

    The Check Point solution has improved the way the customer organization functions.

    People are working within the organization all over the world, across NALA, APAC, and EMEA regions. Having Check Point as a security vendor made it easy to assure people they could access the resources everywhere, from offices, homes, and across the globe, especially during the pandemic, safely.

    One of the last implemented projects was replacing an obsolete Client Auth solution with Identity Awareness, including integration to AVD.

    What is most valuable?

    The solution plays an important role in preventing security incidents from happening and preventing malicious attempts to infiltrate into the organization while quickly adapting and reacting to any attempts. For example, it protected us against Log4J vulnerability a few months ago.

    It is easy to administrate and maintain.

    The product is very granular in the Logs & Monitor section and also intuitive to use.

    It offers good control and visibility over users' identities and actions.

    It provides central policy management, which is easy to manage and maintain.

    The product offers great performance tuning features like SecureXL, CoreXL, HyperThreading, and Multi-Queue.

    What needs improvement?

    The study material and training need to be improved and become more accessible to security engineers working with Check Point.

    Needs serious skills for advanced troubleshooting. The configuration might get a little bit too complex for regular engineers, compared with easy administration.

    We've encountered a few limitations when trying to accomplish simple tasks required by customers. For example, changing a domain name inside an MDS environment or missing a function in the database which removes the domain object completely from the database.

    There are plenty of bugs that are not documented, or with too generic error messages.

    For how long have I used the solution?

    I've used the solution for eight years.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Director of Enterprise Solution at a tech services company with 501-1,000 employees
    Real User
    Top 5
    Feb 27, 2024
    Offer robust protection for networks and data
    Pros and Cons
    • "Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection."
    • "One area for improvement in Check Point NGFW is the support process."

    What is our primary use case?

    In our logistics setup, we employ Check Point NGFW across various critical areas. For instance, we use it to secure different database applications within our systems, ensuring robust protection for our operations. Whether it is managing updates, maintaining standby reliability, or enhancing system performance, Check Point NGFW plays a vital role in safeguarding our logistics infrastructure.

    How has it helped my organization?

    Using Check Point in our system has provided several benefits. Firstly, it ensures secure access for authorized users while preventing unauthorized access from public users. Secondly, it enables us to monitor application usage closely, identifying any suspicious activity such as repeated failed login attempts. 

    What is most valuable?

    Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection.

    What needs improvement?

    One area for improvement in Check Point NGFW is the support process. It can be challenging to open a technical support case through the customer portal, often requiring additional steps to open the case.

    For how long have I used the solution?

    I have been working with Check Point NGFW since 2015.

    What do I think about the stability of the solution?

    We have not experienced any major stability issues with Check Point NGFW.

    What do I think about the scalability of the solution?

    Check Point NGFW is fairly scalable.

    How are customer service and support?

    The technical support is decent. I would rate them as an eight out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Setting up a new Check Point NGFW is generally straightforward for us. With our experience and familiarity with the process, we can handle it without encountering any significant issues. We are used to creating simulations and implementing improvements, which facilitates the setup process, even at an intermediary level. We usually require two engineers for the deployment process, along with additional resources like network switches, PCs, and testing equipment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing for Check Point NGFW tends to be higher compared to other options in the market, especially for high-end models. In comparison with enterprise-grade firewalls like Palo Alto, Check Point is among the more expensive choices.

    What other advice do I have?

    My recommendation for organizations considering implementing Check Point NGFW is to prioritize selecting high-end models for optimal performance and security. Check Point NGFW offers robust protection for networks and data, allowing businesses to maintain their operations with confidence. Overall, I would rate Check Point NGFW as an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
    PeerSpot user
    Sankha Rajaguru - PeerSpot reviewer
    System Engineer at a tech services company with 11-50 employees
    Real User
    Top 10
    Dec 18, 2023
    Advanced threat prevention with unified threat management and precise application control, offering robust security features to safeguard networks against a wide range of cyber threats
    Pros and Cons
    • "Its most significant strength lies in its superior threat detection engines."
    • "I would highlight the need for enhancements in technical support services."

    What is our primary use case?

    Our customers primarily use it to safeguard their organization's network against malicious activities and closely monitor user internet usage. The key objectives include implementing controls on web and application usage to restrict unwanted activities among users.

    How has it helped my organization?

    The primary advantage stems from the precision of the application engines. Customers can rest assured that unwanted infiltrations into their organizations are unlikely due to the advanced nature of the IAV engines. The algorithms employed are notably stringent, and while they may not be publicly disclosed, they play a crucial role in thoroughly scanning all incoming network traffic. Leveraging this technology, customers can swiftly and effectively protect their LAN network with Check Point.

    What is most valuable?

    Its most significant strength lies in its superior threat detection engines.

    What needs improvement?

    I would highlight the need for enhancements in technical support services.

    For how long have I used the solution?

    I have been working with it for four months.

    What do I think about the stability of the solution?

    I found it to be reliable and stable.

    What do I think about the scalability of the solution?

    It provides good scalability. In total, we are responsible for around three hundred and fifty endpoints.

    How are customer service and support?

    Our experience with their customer support is not very satisfactory. We've encountered an incident at one of our customer sites, and despite reaching out for support and raising the issue with them, we haven't received a satisfactory solution from the support team in the past three months. I would rate it three out of ten.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    Compared to other vendors such as FortiGate and Kaspersky, Check Point's protection engines stand out for their intuitiveness. However, the drawback lies in the pricing.

    What about the implementation team?

    In our deployment process, there are two methods available: standard and distributed. The predominant choice in our country is the standard deployment, utilized by approximately ninety-two to ninety-five percent of our customers. In the standard deployment approach, a separate server is configured with three ports, situated between the firewall and the switch. Configurations are not directly applied to the firewall; instead, they are made on the server. After completing the configurations on the server, the changes, such as creating new firewall rules, are not immediately connected to the firewall. Instead, they go through the server, where calculations are performed, and the configured rules are loaded. If a misconfiguration is detected, the server notifies us, highlighting any inaccuracies in the rules or policies. This preventive measure helps avoid applying flawed configurations directly to the firewall. Regarding the ISMP modules, I believe a single individual is sufficient. Given some time for research, this person should be able to deploy it efficiently for me. The deployment time varies depending on the configurations. Maintenance primarily involves updating the firmware; aside from that, there are no additional requirements.

    What was our ROI?

    The greatest value is evident when an immediate threat targets your organization. Check Point firewalls excel in preventing such attacks, thanks to their highly advanced protection engines.

    What's my experience with pricing, setup cost, and licensing?

    It is a notably expensive product in our country compared to FortiGate and other servers. The support services, licenses, and the additional requirement for another license to avail 24/7 support from Check Point contribute to its overall higher cost.

    What other advice do I have?

    My recommendation is to allocate time for thorough research when working with it. Relying solely on their support may not be sufficient. Overall, I would rate it nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
    PeerSpot user
    Cyber Security Consultant at a tech services company with 1-10 employees
    Reseller
    Top 20
    Dec 17, 2023
    Good security intelligence, which helps detect threats but room for improvement in stability
    Pros and Cons
    • "I like the GUI."
    • "A lot of things need to be improved in Check Point NGFW. One, their support team isn't very efficient and useful."

    What is our primary use case?

    For Check Point, the main cases are just perimeter security, network security, basically detecting threats on the network, antivirus, application control, visibility, login, and data threat prevention.

    What is most valuable?

    I like the GUI. In terms of functionality, it used to be the detection capability. Check Point has good security intelligence, which helps detect threats. They have the historical background to do that. But now, Fortinet is a bit better. 

    What needs improvement?

    A lot of things need to be improved in Check Point NGFW. One, their support team isn't very efficient and useful. 

    The solution itself isn't easy to learn, making it hard for support to provide solutions. The design makes it so pockets (specific teams) have to work together when there's an issue, which creates a mess.

    Also, Check Point lacks competitive capabilities like SD-WAN and CGM app integration. And visibility needs improvement. For example, Fortinet shows all connected devices with IP addresses, MAC addresses, and sometimes usernames. More granular detail is crucial for security.

    So support efficiency, visibility, and adding competitive capabilities are key areas for improvement.

    For how long have I used the solution?

    I have been with Check Point for a very long time. So, it has been almost six years.

    What do I think about the stability of the solution?

    I would rate the stability a six out of ten. There is room for improvement here. 

    What do I think about the scalability of the solution?

    I would rate the scalability a seven out of ten. My customers are mostly medium-sized businesses, but my clientele also includes enterprises.

    How are customer service and support?

    There is room for improvement in the customer service and support. 

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I'm heavily biased towards Fortinet. Check Point is a direct competitor, so from my experience, it's a decent firewall. There are strong points and weak points, but Fortinet is superior for various reasons.

    How was the initial setup?

    The initial setup is really straightforward. The GUI is very good. However, the issue I have is with the stability. In terms of simplicity, I don't consider Check Point to be a straightforward solution. Another point to mention is my experience in planning within customer environments. The outcomes are not always as expected. 

    For instance, when setting up Check Point firewall and flat policies, the policies didn't take effect immediately. There was a situation where the policies took effect after about two hours. Such instances were mind-boggling. Regarding VPN issues, when implementing IP protection between Check Point and other vendors, remote access can be challenging.

    In Nigeria, it's predominantly on-premises. Many organizations are moving towards cloud, but many others use a hybrid approach, both on-premises and in the cloud. 

    A few are using Check Point in the cloud, but most test with Fortinet due to easier integration with public cloud providers like Microsoft. Public cloud vendors also have their own firewalls, like Microsoft and AWS. In terms of adoption, Check Point is behind in cloud adoption in Nigeria.

    What about the implementation team?

    Overall, the process is very fast and depends on the type of deployment. For example, replacing a Cisco firewall with Check Point requires converting policies, which can take quite a while, depending on the size of the policy base. In my personal experience, setting up Check Point was very quick.

    What's my experience with pricing, setup cost, and licensing?

    It's reasonably priced, but competitors offer much cheaper options. It's market-related, so the pricing makes sense for what Check Point offers.

    What other advice do I have?

    My recommendation is to consider Fortinet as an alternative. Overall, I'd rate it a seven out of ten. There's room for improvement, especially since Check Point doesn't seem too focused on our region. 

    In Nigeria, procuring the firewall and bundled services like technical account management and professional services can be challenging. The service delivery is not as efficient as one would expect, which wouldn't be the case for a European customer.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    Rahul Kamble. - PeerSpot reviewer
    Business Director at a financial services firm with 201-500 employees
    Reseller
    Top 5
    Nov 10, 2023
    An expensive solution that needs to set up support centers in India
    Pros and Cons
    • "I rate the tool's stability a ten out of ten."
    • "Check Point NGFW needs to run marketing events. They have also to set up a support center in India."

    What needs improvement?

    Check Point NGFW needs to run marketing events. They have also to set up a support center in India. 

    For how long have I used the solution?

    I have been working with the product for 12 years. 

    What do I think about the stability of the solution?

    I rate the tool's stability a ten out of ten. 

    What do I think about the scalability of the solution?

    I rate the tool's scalability a ten out of ten. 

    How was the initial setup?

    I rate the tool's initial deployment a nine out of ten. 

    What's my experience with pricing, setup cost, and licensing?

    Check Point NGFW is expensive. 

    What other advice do I have?

    We have customers from medium and corporate enterprises. I rate the solution a ten out of ten. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    Technical Engineer at a tech services company with 11-50 employees
    Real User
    Nov 1, 2023
    Robust network security with advanced features, user-friendly management, and good scalability
    Pros and Cons
    • "Its greatest asset lies in its user-friendly interface, making it exceptionally suitable and reliable for managing gateways."
    • "When it comes to Check Point's small business gateway series, there might be a need for hardware upgrades, as configuring them can sometimes be a bit challenging."

    What is our primary use case?

    The primary use case is to enhance security by safeguarding the internet connection for both servers and users.

    What is most valuable?

    Its greatest asset lies in its user-friendly interface, making it exceptionally suitable and reliable for managing gateways.

    What needs improvement?

    When it comes to Check Point's small business gateway series, there might be a need for hardware upgrades, as configuring them can sometimes be a bit challenging.

    For how long have I used the solution?

    I have been working with it for two years.

    What do I think about the stability of the solution?

    I would rate its stability capabilities eight out of ten.

    What do I think about the scalability of the solution?

    I would rate its scalability abilities eight out of ten.

    How are customer service and support?

    Seeking solutions from them can be quite challenging and often takes a while, which then impacts our workload. I would rate it seven out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have some experience with Juniper, WatchGuard, Cisco, and Fortinet.

    How was the initial setup?

    The initial setup is relatively complex.

    What about the implementation team?

    Deployment duration varies based on the customer's specific conditions. On average, an installation might take around twenty minutes.

    What's my experience with pricing, setup cost, and licensing?

    The best solutions tend to come with a higher price tag. If something is inexpensive, it often implies a compromise in quality. The solution is indeed costly. I would rate it eight out of ten.

    What other advice do I have?

    Overall, I would rate it eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: February 2026
    Buyer's Guide
    Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.