We use Check Point Next Generation Firewalls as a perimeter firewall for all sites, including the DMZ, disaster recovery center, and branch offices. We also use IPS, Anti-Bot, Antivirus, Identity Awareness, Application Control, and URL Filtering blades at all gateways. At our main site, these blades provide additional security controls to our existing security solutions. For our branch offices, Check Point Next Generation Firewalls work as unified security products and we do not need to implement additional security solutions.
Senior Cyber Security Consultant at Yapi Kredi
Great blade technology, easy to configure, and lowers administrative workloads
Pros and Cons
- "The ease of configuring VPNs can be very useful especially for companies with lots of remote locations."
- "If you have a long ruleset, you may experience performance issues on the GUI, and installing rule changes on gateways can take a comparatively long time."
What is our primary use case?
How has it helped my organization?
In addition to legacy firewall features, by using Check Point Next Generation Firewalls blade technology, you can improve your security.
By using the smart console, you can control tens of gateways from a single point. The smart console also allows you to control all the blades from the same GUI. These features decrease our manpower needs.
The identity awareness feature makes it easier to implement and manage firewall rules.
The ease of configuring VPNs can be very useful especially for companies with lots of remote locations.
What is most valuable?
Check Point Next Generation Firewalls have numerous blade options such as Anti-bot, IPS, and URL filtering. In most cases, one box could be sufficient to use all these blades. You can manage all these blades from a single console. This feature lowers your administrative workload.
If you have comparatively small branch offices, in addition to administrative workload, instead of spending money for security products such as proxy or IPS, Check Point Next Generation Firewalls could meet your requirements.
What needs improvement?
If you have a long ruleset, you may experience performance issues on the GUI, and installing rule changes on gateways can take a comparatively long time.
If you use Check Point firewalls for a long time, it is inevitable to have long rulesets over the years. The need for using different GUI applications for different versions can be confusing. A backward compatibility feature for smart console versions could be useful - especially if you are an enterprise customer, you probably need to use different versions at the same time.
Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
We have used the solution for 9+ years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Linux Administrator at Cartrack
Simple to scale with a nice management interface and good technical support
Pros and Cons
- "Many problems have been solved with these firewalls and we've largely been very satisfied."
- "The predefined reports are few and it would be nice to increase them since the logs are excellent."
What is our primary use case?
Check Point's Next Generation Firewall has definitely improved our organization as we previously used a Linux firewall and we have had to manually configure internet control measures. When it comes to configuring firewall policies it was time-consuming. This has been taken care of by Check Point's Next Generation firewall. Even the integration to the Active Directory has been made to be seamless and requires a minimum effort from our security and network administrators. The technologies that are in place are amazing. For example, the Threat Extraction and Threat Emulation technologies. The Sandbox technology, or Threat Cloud, is world-class.
How has it helped my organization?
The remote access blade functionality is really valuable as we now need to just install the client on the user's machines and the client can be preconfigured with the site details. This makes our lives very simple. The logging of the firewall is also phenomenal as it is very granular and very easy to filter.
The Application control blade is another valuable feature as we now only need to create a rule to be applied and to specify the applicable application which is categorized. The ability to configure dynamic objects, for example, Microsoft Office 365, is also a valuable feature.
The reports are very detailed and the variety is amazing. It caters to everything and is even more that what we had bargained for. They are also customizable, which makes them extremely valuable to us.
Another great feature is the ability to publish corporate applications in a secure web environment.
What is most valuable?
Many problems have been solved with these firewalls and we've largely been very satisfied. Thanks to this infrastructure that we have managed, in this pandemic time, to quickly and effectively offer the potential to remotely work for everyone has been good.
Also important is the separate management interface that has made it possible to carry out even the most operations while comfortably seated at the desk. It provides multiple profiles that you can apply depending on the scenario that presents itself.
What needs improvement?
It takes a while to install the rules so that if you make a mistake you can only fix it after a few minutes. There's no problem with traffic processing.
Sometimes you are forced to interact on several levels: on the one hand, you put in the rules, and on the other, you put in the route. The predefined reports are few and it would be nice to increase them since the logs are excellent.
In my work experience, I have been able to use multiple firewall platforms. There are only two valid ones for me and one of them is definitely Check Point. The others charge less but there is a reason for that. It is a good idea to think carefully before rather than after you suffer from a serious attack.
For how long have I used the solution?
We have been using the solution for three years now.
What do I think about the stability of the solution?
For me, the solution has been stable. Perhaps running it on a small scale helps.
What do I think about the scalability of the solution?
I like the fact that it's so simple to scale.
How are customer service and technical support?
I find the support to be very prompt. They go the extra mile to assist and are thorough in their troubleshooting.
Which solution did I use previously and why did I switch?
I did not use a different solution, however, I came to know about this product while I was working for a company called Syrex.
How was the initial setup?
It was set up for us by a company I used to work for.
What about the implementation team?
It was through a vendor, and they were very good and did it on time as they promised.
What was our ROI?
A stable and fully functioning solution has enabled us to focus on other aspects of growing the business.
Which other solutions did I evaluate?
I looked at Fortigate, and it was not as clearly defined, and easy to follow as Check Point is.
What other advice do I have?
Check Point does cost a lot, but for me, it's worth the money I paid.
Some of the products are easier to deploy. For example, the Harmony products are simpler as they have a per user/per device pricing model.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
October 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
868,787 professionals have used our research since 2012.
Firewall Engineer at a logistics company with 1,001-5,000 employees
Scalable, stable, and configurable
Pros and Cons
- "Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment."
- "The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long."
What is our primary use case?
We use Check Point Gateways for securing our data centers including DMZ networks as well as gateways for our branch offices around the world. They are connected via MPLS, internet, or site-to-site VPNs depending on the branch connectivity.
A minimum standard for the whole environment is the NGFW. Firewall rules according to our security policy. VPN for site-to-site tunnels to our own gateways or to partners and customers. IPS is set primarily to prevent, and for some signatures to detect.
Application Control is still in the early stages.
How has it helped my organization?
Firewalling is one of Check Point's core business attributes, and it just works.
Creating site-to-site VPNs between Check Point Gateways that are within the same management is unbelievably easy. If you create VPNs for 3rd parties and there are mismatches or issues, you will see logs that help pinpoint issues or misconfiguration.
Application control help with identifying applications and therefore makes firewall rules easier since changing ports don't have to be adapted every time an application changes or updates.
What is most valuable?
Generally speaking, all features are well documented and the two platforms help with configuration. Documentation and knowledgebase articles in the user center as well as user recommendation within the forums are great. The Admin Guides are really well documented, but it's a lot to read.
Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment. The best example would be the CDT tool which helps with decreasing the amount of time for upgrading whole environments.
What needs improvement?
The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long. R81 promises at least parallel policy installations, which help in larger environments.
Check Point's advantage (to be able to configure everything) is also a disadvantage. The environment is quite complex. Troubleshooting is not always easy as there are a lot of possible debugs that can be taken, and the support will not always send the right or necessary debugs. Some debugs also can cause a heavy load, so you have to keep an eye on what you troubleshoot.
For how long have I used the solution?
Our company has used Check Point for well over 10 years.
What do I think about the stability of the solution?
If it's running, it's stable. New setups have to be tested though.
What do I think about the scalability of the solution?
The solution can be scaled from very small branch offices to huge data centers or even cloud data centers.
How are customer service and technical support?
Support depends on how well you describe the issue and send information. Sometimes escalation is necessary.
How was the initial setup?
The more features (blades) are turned on, the more complex the environment becomes. If something goes wrong, you have to rule out several issues (hardware, blades, et cetera).
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
A next generation firewall solution with a useful SmartEvent feature
Pros and Cons
- "I like the SmartEvent feature. When we see a threat, SmartEvent can create a rule for that. SmartEvent works with the SmartCenter to block a threat attack with a block monitor. The SmartCenter has the management for all the firewalls and data centers in a single dashboard."
- "It could be more stable and scalable. Check Point price and support could be better."
What is our primary use case?
I use CheckPoint in our data center to control the internet and to enable threat prevention. I then integrate it into my center and to my events.
What is most valuable?
I like the SmartEvent feature. When we see a threat, SmartEvent can create a rule for that. SmartEvent works with the SmartCenter to block a threat attack with a block monitor. The SmartCenter has the management for all the firewalls and data centers in a single dashboard.
What needs improvement?
It could be more stable and scalable. Check Point price and support could be better.
For how long have I used the solution?
I have ten years of experience using Check Point NGFW.
What do I think about the stability of the solution?
Check Point NGFW could be more stable. I think the problem is that the kernel sometimes won't play ball and isn't stable. Sometimes, they have a block, and we have to spend a lot of time fixing it. In contrast, I think Palo Alto and Fortinet are more stable.
What do I think about the scalability of the solution?
Check Point NGFW could be more scalable. I think Palo Alto has more plugins and features, and Check Point needs more features. However, Check Point integration is very complex.
How are customer service and technical support?
Check Point support could be better. I think Palo Alto has a very clear pricing model. When we have an issue, we create a ticket and receive fast service from Palo Alto. It's good.
How was the initial setup?
The initial setup, in my experience, isn't simple as Fortinet and Palo Alto. It would be better if the person doing it has experience.
What about the implementation team?
I implemented this solution by myself.
What's my experience with pricing, setup cost, and licensing?
The price could be better. I think Palo Alto pricing is high, and Check Point isn't much better. FortiGate is cheaper. I think when I implemented this solution, I recommended buying a yearly subscription.
Which other solutions did I evaluate?
When I choose a solution for a customer, I must verify the features, current specifications and make recommendations. When we use an all-in-one firewall solution, we usually recommend using a Palo Alto external firewall. This is because Fortinet has an SD-WAN solution and firewalls, and Palo Alto is the same. But I don't think Check Point has one. When a customer doesn't want to implement many solutions, we recommend using Fortinet or Palo Alto.
What other advice do I have?
On a scale from one to ten, I would give Check Point NGFW an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Security Manager at a retailer with 10,001+ employees
Highly secure, good performance, and reliable
Pros and Cons
- "Check Point NGFW is easy to use, flexible and provides good performance. The security of the product is excellent, we do not have to do a lot of patching or upgrades because of vulnerabilities."
- "The solution could improve by keeping more up-to-date with technology. For example, if Amazon releases something in the security field, Check Point should have integration or adoption of this feature a bit faster than it is today. Sometimes we can hear a lot of the marketing information about an attractive feature, which we would like to have, but the feature will be released in two years. This timeframe should decrease."
What is our primary use case?
We use the solution for a perimeter firewall, an internal segmentation firewall, and a routing device in our organization.
What is most valuable?
Check Point NGFW is easy to use, flexible and provides good performance. The security of the product is excellent, we do not have to do a lot of patching or upgrades because of vulnerabilities.
What needs improvement?
The solution could improve by keeping more up-to-date with technology. For example, if Amazon releases something in the security field, Check Point should have integration or adoption of this feature a bit faster than it is today. Sometimes we can hear a lot of the marketing information about an attractive feature, which we would like to have, but the feature will be released in two years. This timeframe should decrease.
For how long have I used the solution?
I have been using Check Point NGFW for approximately nine years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
This solution provides service for 50,000 employees in my organization.
How are customer service and technical support?
We have premium support which is different from regular support. We have had good experiences with the support.
Which solution did I use previously and why did I switch?
We have used BitScaler previously and use Check Point CloudGuard Network Security.
How was the initial setup?
The installation is easy. It can be installed through an image very quickly.
What was our ROI?
The solution has saved us a lot of costs from an operational perspective.
What's my experience with pricing, setup cost, and licensing?
There is an annual license required for this solution.
What other advice do I have?
I would recommend this solution. However, I would advise everyone to carefully evaluate their needs against this vendor and compare them with the competition. There is a lot of strong competition between Palo Alto and Fortinet. One could have an advantage over the other for a customer's specific use case.
I rate Check Point an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at a transportation company with 501-1,000 employees
Easy to set up, stable, and offers excellent technical support
Pros and Cons
- "The packet inspections have been a strong point."
- "I would like there to be a way to run packets that capture more easily in the GUI environment. Right now, if we want to read packet captures, we have to do so from the command line."
What is our primary use case?
It's our main firewall and the first line of protection from outside attacks. We use it to interconnect our remote locations (that use different vendors and equipment) and let the employees work remotely. We're a small site with 300 users and this equipment is more than enough for us. We use almost all the blades and the equipment has run smoothly for years. This NGFW monitors all the traffic outside of the main network, prevents malicious activities, and lets us easily manage network policies to shape our connections.
How has it helped my organization?
We have a lot of flexibility now, and a leg up identifying zero-day threats. We have multiple ways of doing policies now that we didn't have before. The options are more robust than previous products and I would say that we're pleased with the product. The reports I'm getting are that we're satisfied, even impressed, with the options Check Point offers.
There is a scope of improvement in detecting zero-day threats using the SandBlast technology, by introducing emulation of Linux-based operating systems. We have also observed issues while using the products with SSL decryption. There is room for improvement in application-based filtering, as with other firewalls available in the market today. Check Point has improved its application filtering capabilities in the recent past and their latest version, R80, is more capable but still, creating an application-based filter policy is a little cumbersome.
What is most valuable?
It's a NGFW with all of the capabilities required to protect for next-generation attacks at the perimeter level. The module or Security features that are provided as part of the base license with Check Point include (VPN, IPS, Application Control, and Content Awareness) which itself is strong enough to protect the organization.
The packet inspections have been a strong point. Our identity collectors have also been helpful. In many ways, Check Point has been a step up from the SonicWall that we had in-house before that. There's a lot of additional flexibility that we didn't have before.
What needs improvement?
I would like there to be a way to run packets that capture more easily in the GUI environment. Right now, if we want to read packet captures, we have to do so from the command line.
The biggest improvement they could make is having one software to install on all three levels of their products, so that the SMBs, the normal models, and the chassis would all run the same software. Now, while there is central management, everything that has to be configured on the gateway itself works differently on the three kinds of devices.
For how long have I used the solution?
I started using the solution 3 months ago.
What do I think about the stability of the solution?
The web interface was easy for me. The configuration is logical, so it's easy to use and easy to understand how to protect, how to open a port, how to manage, and how to route a device. That's why I prefer Check Point. It's robust and I never have issues with the hardware.
What do I think about the scalability of the solution?
The scalability is quite good. You can scale well across locations for not too much cost. If a company needs to expand, it can do so relatively easily.
Also, cost-wise, it's very affordable to scale up. It's not expensive to add hardware and licenses as needed. They make upgrading very cheap.
We have 200 people on the solution. That said, they are using it with an IPsec tunnel. They don't use all of the capabilities of the hardware. They are using it just to encrypt tunneling between the sites.
How are customer service and technical support?
Technical support has been excellent
Which solution did I use previously and why did I switch?
Yes, we were previously using SonicWall but security is less robust in comparison to Check Point.
How was the initial setup?
The initial setup is very easy.
What about the implementation team?
We implemented it through a vendor called S G Informatics India Pvt Ltd.
The level of expertise I would rate at 10 out of 10.
What's my experience with pricing, setup cost, and licensing?
I would recommend going into Check Point solutions. Although Check Point has the option of implementing your firewall on a server, I would advise implementing it on a perimeter device because servers have latency. It's best to deploy it on a dedicated device. Carry out a survey to find out if the device can handle the kind of workload you need to put through it. Also, make it a redundant solution, apart from the Management Server, which can be just one device. Although I should note that, up until now, we have not had anything like that ourselves.
Which other solutions did I evaluate?
We have looked into Sophos.
What other advice do I have?
The most valuable features are the security blades and the ease of managing the policies, searching logs for events, and correlating them.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Security Analyst at Atos
Great GUI with a good centralized management console and helpful technical support
Pros and Cons
- "The initial setup is very straightforward."
- "They could make the licensing a bit easier to deal with, especially for enterprise-level options."
What is most valuable?
Check Point is very strong as compared to the other vendors in the market.
The solution offers a very good centralized management console.
It works well even for small deployments.
The perimeter security is excellent.
It works well even for cloud environments and has been very useful during COVID when people weren't necessarily in the office.
The creation of policies is simple. It's easy to configure them when we need to.
We have found the troubleshooting process to be very easy and helpful.
The GUI is simple and straightforward.
The sandbox environment on offer has been great.
The support has been super-helpful. They've always been great, even at a pre-sales level.
The initial setup is very straightforward.
What needs improvement?
From a stability standpoint, sometimes when upgrading to a new version, there are some stability issues. The device occasionally may stop responding.
It would be beneficial if they offered better load balancing.
They could make the licensing a bit easier to deal with, especially for enterprise-level options.
For how long have I used the solution?
We primarily use the solution for security, as a next-generation firewall that we use in our environments. It is very good at detection and prevention. However, we are still exploring use cases.
What do I think about the stability of the solution?
While the solution is mostly stable, we do find that we have stability issues moving to different versions. You run the risk of the device not responding in some cases.
What do I think about the scalability of the solution?
The scalability is possible, however, it's based on requirements. When we get a new solution, we plan out for the next four or five years. It can scale so long as you design it properly at the outset.
How are customer service and technical support?
Technical support is helpful and responsive. We're quite satisfied with the level of service we can expect. They are very good.
Which solution did I use previously and why did I switch?
I've also worked with Palo Alto and Cisco.
How was the initial setup?
The initial setup is extremely straightforward. You don't even have to be overly technical to manage it. They make it very easy. It's not overly complex or difficult.
What's my experience with pricing, setup cost, and licensing?
The licensing is okay. Clients can go for a one, three, or five-year license.
Sometimes it's complicated to put new licensing on existing devices. If we have issues, we can raise questions with the sales management team and they are always very helpful. Larger, enterprise-level devices, in particular, can be a bit complex to deal with.
What other advice do I have?
We are integrated partners and we provide services to the customers.
I didn't get any chance to work on version 80.40, however, a lot of the customers are on versions 80.10, 80.20, and 80.40.
I would encourage users and companies to use Check Point. It's quite a good solution. I find it to be a better solution than, for example, Palo Alto.
I'd rate the solution at a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Senior Infrastructure Technical Lead at a financial services firm with 10,001+ employees
Great management console and operations support but they need to focus on its overall robustness
Pros and Cons
- "The ability to split single hardware into multiple virtuals along with support for dynamic routing using BGP is very useful for our environment."
- "I would like less CPU-intensive features to be introduced to replace the existing heavy-duty processes."
What is our primary use case?
We primarily use the solution for perimeter security - including DMZ and as an internet firewall. We use Check Point Firewalls as the first line of defense from the internet and they are also used to segregate the internet, DMZ, and internal networks. Check Point VSX technology is used to split the hardware into multiple virtual firewalls to cater to different environments so they are well segregated. We have BGP running on the firewalls, such as all of our network devices in our environment, to learn and advertise routes. Check Point does a decent job with BGP and does an excellent job as a perimeter firewall.
How has it helped my organization?
Check Point was brought into our environment as a perimeter security device to replace the Juniper NetScreen which was originally used as the perimeter firewall. When Juniper announced the end of life of NetScreen devices, we decided to go with Check Point mainly because of the ease of management and also because Check Point was an Industry leader and Juniper was still in the initial stages of building their own firewalls using JunOS. With the introduction of Check Point with the VSX features, we could use BGP instead of the tedious static routes that we had in place with the old NetScreen.
What is most valuable?
The VSX has been great. The ability to split single hardware into multiple virtuals along with support for dynamic routing using BGP is very useful for our environment.
We like the management console. The Check Point smart dashboard has made things easier for administration and we've been able to manage all the Check Point devices from one place which is very useful.
The operations support is great. There is a smart log system that is very good for troubleshooting and reporting. We also use the CLI for troubleshooting purposes (for the likes of FWMonitor and tcpdump) while the FW rules are managed via the smart console which does wonders for operations support.
What needs improvement?
It is common for any network device to compromise on stability when more and more features are packed into it. It may work for small organizations when they want a single device to do everything for security. However, it is a big issue for us as a large financial institution when even a small outage costs dearly. Check Point, being our perimeter firewall, has failed quite a few times mainly when handling BGP. I would like less CPU-intensive features to be introduced to replace the existing heavy-duty processes. They may already have a lot of features, so the enhancement of existing features could focus on robustness rather than introducing new features.
For how long have I used the solution?
I've been using the solution for three years.
What do I think about the stability of the solution?
With the upgrade to R80, the solution has become more stable. We have had outages because of the gateways failure while running BGP with older versions. After the upgrade, we havent had such outages.
What do I think about the scalability of the solution?
With the latest upgrades of R80, Check Point has bettered its performance, and hence, scalability has improved a lot. Also, there are multiple NG features that can be utilized that makes it more suitable for multiple solutions.
How are customer service and technical support?
They offer very good customer support; they're always available and capable.
Which solution did I use previously and why did I switch?
We previously used NetScreen and they were at their end of life.
How was the initial setup?
Check Point has its own design that is a little complex compared to other products. This has a 3-tier architecture and we need management servers and gateways separate. I would still say its not much of a hassle building it.
What about the implementation team?
We handled everything through Check Point PS. They were very good.
What was our ROI?
I can't really comment, as I do not have much idea about this space.
What's my experience with pricing, setup cost, and licensing?
The solution is priced well in the market in order to compete with the other products.
Which other solutions did I evaluate?
I wasn't in the organization when the evaluation happened. However, I know Juniper SRX was one of the solutions looked at as we are using them for our internal firewalls.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?