Try our new research platform with insights from 80,000+ expert users
reviewer1691745 - PeerSpot reviewer
Technology Architect at a consultancy with 1,001-5,000 employees
Consultant
Oct 13, 2021
East to setup with great central management capabilities and identity-based access
Pros and Cons
  • "It's enabled us to move away from basic LAN to LAN segmentation to a more powerful user separation approach."
  • "One area which is still lacking is the site-to-site VPN solution."

What is our primary use case?

We use our Check Point NGFW firewall mainly for perimeter security. Those firewalls are placed at many sites distributed over Europe. We love the firewall management and think it's still the golden standard for creating a rule base and we go more and more in the direction of identity bases user access to secure our environment.

The other firewall blades, such as Anti-Bot, Application and URL-Filtering, and IPS, are used on all sites. It's easy to deploy, as the firewall is able, with the latest version, to learn from the traffic and adapt the IPS policy.

How has it helped my organization?

Check Point NGFW has improved our organization with more security and easier deployments. There is a smaller amount of workload in the supporting area. We find a lot of documentation for the products and benefit from a big community. The Check Point support is much better than what we have seen from other vendors. The firewall policy is easy to deploy and we can do a more granular separation of specific user groups. We feel much more secure with this product - especially the API support - and possible automation has saved us a lot of time in our team and organization.

What is most valuable?

The most valuable features are the identity-based access and high-quality intrusion prevention functionalities. 

One of the most valuable aspects is the central management, which includes a large wide range of API calls. With the central management, we can define a reasonable security policy for many sites and not only for network segments but for user and AD groups. This gives us a bit more "Zero Trust" in our network.

It's enabled us to move away from basic LAN to LAN segmentation to a more powerful user separation approach.

What needs improvement?

One area which is still lacking is the site-to-site VPN solution. This is still an area that could be improved, although the features have gotten much broader and I really have seen an improvement over the last 10 years of working with the product. The separation from encryption domains between the tunnels came recently as a new feature to the product. This really helps a lot. Yet, we are still seeing a lack of compatibility with other devices, even though this is the case with many vendors. Especially with IKEv2, we are struggling with many vendors to set up perfectly running tunnels.

Buyer's Guide
Check Point Quantum Force (NGFW)
January 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.

For how long have I used the solution?

I'm working with Check Point for 10 years.

What do I think about the stability of the solution?

If you go by best practice recommendations from Check Point the stability is very good.

What do I think about the scalability of the solution?

Scalability is really good. Check Point has the Maestro solution, where you can really scale easily without wasting resources.

How are customer service and support?

They are really anxious to solve issues as fast as possible. They also try to get in actual contact with you via phone or chat to fully understand the issue.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

In some areas we were using Cisco, however, we changed to Check Point to centralize things.

How was the initial setup?

The setup is pretty straightforward, at least for the basic setup. Even with more complicated configurations, you have good support and experts at Check Point in the background that can help.

What about the implementation team?

We did it ourselves.

What's my experience with pricing, setup cost, and licensing?

Check Point is definitely not the cheapest solution, but the better security makes it worth the price. The licensing model is pretty easy, especially when it comes to the extension for many environments.

Which other solutions did I evaluate?

We looked at Cisco, Barracuda, and Fortinet.

What other advice do I have?

I'd advise teams to give it a try!

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1686129 - PeerSpot reviewer
Senior infrastructure technical lead at a financial services firm with 10,001+ employees
User
Oct 4, 2021
Super technical support, scalable, and has very useful dashboards
Pros and Cons
  • "Objects search and tracker logs are useful."
  • "The pricing could be better."

What is our primary use case?

The solution is primarily used for firewall protection for an enterprise environment, The Check Point firewalls are implemented on the perimeter (DMZ) and Secure Access Domain (SAD) environments. 

We use physical VSLS clusters but have many virtual systems (Vsys) configured for different sub purposes. The Entire management domain is protected by Check Point firewall virtuals running on multiple physical boxes.

We have multiple virtual routers configured on the physical firewalls which connect L3 connectivity to other domains. The Perimeter DMZ firewall protects the boundary zone Environments 

How has it helped my organization?

Check Point firewalls have helped our organization to securely promote the traffic flow in a secure way that is fast and swift.

There's faster identification of customer traffic issues identifies via a smart view tracker and centralized management of rules. It has an ease of access policy and a human-readable format.

We have multiple virtual routers configured on the physical firewalls which connect with L3 connectivity to other domains. The Perimeter DMZ firewall protects the boundary zone environments.

What is most valuable?

Dashboards for rules management and trackers for firewall logs capture are useful.

Traffic flow in Check Point is very structured so that it is easy to understand the path it checks to understand which elements come first and which elements come later.

The smart log compiles from multiple CMAs is an important feature that is very attractive. 

The MDM dashboard is very organized compared to other vendors. The use of CLI tools like TCPDUMP and FW monitor are very useful in verifying the traffic logs.

Objects search and tracker logs are useful.  

What needs improvement?

To combine CLI routing and GUI application in a way that both interact together would be ideal.

The pricing could be better. In general, the Check Point solutions are not cheap, however, you could try to negotiate on the overall contract, especially if you are purchasing a lot of hardware.

In the CLI, while viewing configs, there is no easy way to snapshot configs. 

For how long have I used the solution?

I've used the solution for more than 15 years.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is super.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We switched from Cisco to Check Point. Cisco was CLI-based and cumbersome with rulesets.

How was the initial setup?

The setup is straightforward as there are many videos available on the net to practice with.

What about the implementation team?

We had vendor involvement.

What was our ROI?

It serves the purpose and primarly gets the best output.

What's my experience with pricing, setup cost, and licensing?

The pricing is high. In general, the Check Point solutions are not cheap, however, you could try to negotiate on the overall contract, especially if you are purchasing a lot of hardware.

Which other solutions did I evaluate?

Yes, the vendor ran through the options and based their decision on the company security standards.

What other advice do I have?

We are satisfied with the product and support.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Checkpoint firewall has helped organisation to securely promote the traffic flow in secure way that is fast and swift.
PeerSpot user
Buyer's Guide
Check Point Quantum Force (NGFW)
January 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
reviewer1629138 - PeerSpot reviewer
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees
User
Oct 2, 2021
Stable with great security features and helpful support
Pros and Cons
  • "Even though Check Point NGFW provides a set of security features that enforce protection on the network, the most valuable aspect is also the most used feature: the plain and simple firewall component. This is the core of the product and works to a great extent without the need for all other available bells and whistles."
  • "Although the GUI is simple to use and fairly comprehensive, more support via CLI would be beneficial for bulk operations."

What is our primary use case?

I work for a large bank in Australia and the Check Point NGFW is used on the edge of the network. This strategic positioning allows the platform to provide extensive protection to internal systems from the internet, avoiding security threats on the most sensitive places on the network. 

Another factor in the positioning of the firewall is the protection from external partners connected to the internal network through VPN and MPLS tunnels. The solid performance and flexibility allow the platform to be trusted on this strategic spot.

How has it helped my organization?

Check Point NGFW has contributed to the success of the organization in keeping data safe through its powerful and flexible security features. 

In conjunction with the Check Point Management Platform, the firewalls provide an easy-to-use platform that facilitates and creates agility in the operation. The easiness to operate the platform creates a great value for the operation since it is easy to train people to work with the platform. 

Agility is also a key factor for the rapid response to business needs.

What is most valuable?

Even though Check Point NGFW provides a set of security features that enforce protection on the network, the most valuable aspect is also the most used feature: the plain and simple firewall component. This is the core of the product and works to a great extent without the need for all other available bells and whistles. 

What may sound obvious is actually an important point to be weighed, since several platforms in the market promise miracles but fail to deliver the basics. Check Point NGFW most definitely delivers a great, stable platform in that regard.

What needs improvement?

Although the GUI is simple to use and fairly comprehensive, more support via CLI would be beneficial for bulk operations. Repetitive tasks can surely be explored via API, however, oftentimes, tasks that are not worth automating can take longer than expected via GUI, while it could be easily tackled via CLI.

There should be better and more comprehensive reporting. This would also bring a lot of value to the platform by enhancing its capability of bringing transparency to the network.

For how long have I used the solution?

I've used the solution for about three years.

What do I think about the stability of the solution?

The most recent software version is stable and reliable. There have been some issues in past versions, however, there have been no big ones in the most recent releases.

What do I think about the scalability of the solution?

There are good scalability options through virtualisation. The platform can be expanded to multiple segments.

How are customer service and support?

The support provided by the vendor either via professional services or an engineer is always spot on. They are quick to act and help.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This platform was already being used when I joined my company.

How was the initial setup?

The initial setup can be cumbersome.

What about the implementation team?

We did the implementation with vendor support.

What was our ROI?

As the platform delivers competent security enforcement with simplicity, the ROI is great. The easy-to-operate nature of the product means fewer hours spent by people struggling with things, while the network itself is constantly kept safe. 

What's my experience with pricing, setup cost, and licensing?

The use of virtual firewalls within the platform should be considered for horizontal scaling and in order to increase the product's cost-effectiveness. 

Which other solutions did I evaluate?

I was not part of the evaluation process.

What other advice do I have?

This is a great and stable platform overall. Performance and simplicity make this a good choice for any size of company.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Logical Security Deputy Manager - IT at a financial services firm with 1,001-5,000 employees
Real User
Sep 27, 2021
Robust and reliable with good fault tolerance
Pros and Cons
  • "The way in which it manages the nodes within a cluster architecture is excellent, offering fault tolerance which is, in my experience, practically imperceptible when one of the nodes fails."
  • "It should allow more than two internet providers in its configuration of "ISP Redundancy"."

What is our primary use case?

We use Check Point firewalls as perimeter firewalls which are restricting the organization's incoming and outgoing traffic and taking advantage of the redundancy capacity of internet providers, which provides fault tolerance when an internet provider has a fault. 

In addition, we use it for the publication of services and with an event viewer that allows us to view alerts about behavior and unusual traffic inside and outside the network. URL filtering and application control are perfect complements to the packet filtering that it offers as a firewall solution.

How has it helped my organization?

Check Point offers a reliable firewall solution with VPN options that have allowed us to establish secure and stable connections with other companies and users in a very simple way.

Simple and centralized administration has allowed us to manage all the firewall nodes from a single console, facilitating the deployment of firewalls through the network, since a large part of the configurations and access rules, as well as the protection controls, are managed from a single console and via centralized maintenance.

What is most valuable?

Check Point is a robust and reliable security solution, whose architecture and design allow centralized administration with a graphical interface that facilitates its management. 

The way in which it manages the nodes within a cluster architecture is excellent, offering fault tolerance which is, in my experience, practically imperceptible when one of the nodes fails. This is thanks to the fact that it maintains a table of shared connections between the nodes and the large number of variables that it takes into consideration to validate the health of the nodes.

What needs improvement?

As a firewall, Check Point is a great solution and in my experience, there is little that I could indicate how to improve.

That said, a point where it could improve is in the redundancy of the ISP. It should allow more than two internet providers in its configuration of "ISP Redundancy". This redundancy could be managed from variables such as the automatic calculation of the load level between internet lines or load distribution between internet lines in periods of pre-established hours, etc. All could be handled from the same graphical interface.

For how long have I used the solution?

I have been using Check Point for more than 11 years.

What do I think about the stability of the solution?

Its stability is one of the selling points. It allows us to have great confidence in Check Point solutions.

What do I think about the scalability of the solution?

The performance is excellent in the new appliances. The solution is very scalable and easy to integrate.

How are customer service and technical support?

They have a good response time and their personnel have a good technical mastery.

Which solution did I use previously and why did I switch?

I was using ASA, however, we switched to Check Point as it offered a centralized interface for managing all nodes in addition to having an excellent graphical interface that facilitates day-to-day operational activities.

How was the initial setup?

The initial configuration is very simple and intuitive. Check Point offers a graphical configuration interface that makes the process simple and it is complete in just a few steps.

What about the implementation team?

The provider we have used has highly qualified staff and offers excellent and professional services.

What's my experience with pricing, setup cost, and licensing?

It has an acceptable cost considering the stability and the benefits that Check Point solutions offer.

Which other solutions did I evaluate?

We did not really look at other options. We are very confident with Check Point solutions and we take the stability it offers very seriously.

What other advice do I have?

You must consider Check Point as your first NGFW option. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1680342 - PeerSpot reviewer
Systems Architect at a wellness & fitness company with 51-200 employees
User
Sep 27, 2021
Excellent support, great remote access, and very good reporting capabilities
Pros and Cons
  • "The support offers the best services I have experienced. It's better than any other IT vendor."
  • "Internet load balancing provides either active/passive or active/active load balancing, however, I would like to see more options that provide SD-WAN capabilities while also allowing for more than two links."

What is our primary use case?

Currently, I'm working as a Lead Security Architect in the healthcare industry. We have two data centers, multiple branch offices, multiple cloud subscriptions, and over 200 employees. Our operation is mission-critical and requires it to be up and running 24/7. We need to protect multiple applications that are developed in-house, sensitive data including PHI, Financial, intellectual property, et cetera.

Check Point NGFW and its security modules have been our security solution for the past six years to protect all of our assets, including our cloud subscriptions.

How has it helped my organization?

Check Point Next Generation Firewalls are key components in protecting our assets and information. Their security modules are very easy to use and understand. Also, it's one of the most user-friendly interfaces I’ve had the opportunity to use and I’ve had the chance to work with more than four firewall solutions.

Their reporting and logs modules are amazing. It provides a level of detail and visibility that we haven't had before. It’s useful to understand what is happening on our network and has been very successful in blocking attacks and providing options for executive summaries. 

Being able to manage all the security gateways for our multiple sites in a single management console and share policies has been very beneficial.

What is most valuable?

The Remote Access VPN has been crucial to us, especially during this pandemic. We had to be on lockdown for a couple of months and being able to deploy a remote workforce with Check Point VPN was a crucial part of our business continuity strategy.

The logs and reporting are very easy to use and manage. Also, the IPS and IDS are critical components to keeping our network secure. They are very easy to configure and there are multiple templates that can be used out of the box that provides maximum protection to our network.

The support offers the best services I have experienced. It's better than any other IT vendor.

What needs improvement?

Check Point Firewalls haven't failed me during the past six years that I have been using them. 

If I had to mention anything that I would like to see some improvement on, it’s on the internet load balancing options. Internet load balancing provides either active/passive or active/active load balancing, however, I would like to see more options that provide SD-WAN capabilities while also allowing for more than two links. I know this can be performed with other network devices, however, adding the option as part of the NGFW would be awesome.

For how long have I used the solution?

I have been using Check Point for 6 years now.

What do I think about the stability of the solution?

I've never had a single issue on any of my security gateways.

What do I think about the scalability of the solution?

I haven't had the opportunity to scale, however, I have seen many demos of maestro architecture, and it looks awesome.

How are customer service and technical support?

As I mentioned before, Check Point support is one of the best services from any IT vendor I have experienced. They answer very quickly and also provide solutions most of the time within the first call.

Which solution did I use previously and why did I switch?

I have used multiple solutions in the past. We migrated from Cisco ASA to Check Point six years ago and have never looked back. Our old ASA required additional hardware components for additional security services.

How was the initial setup?

The product is very easy to set up.

What about the implementation team?

The implementation was performed by a vendor team in combination with our in-house security team.

What was our ROI?

My peace of mind is the ROI.

What's my experience with pricing, setup cost, and licensing?

Check Point is not the cheapest firewall solution, but you get what you pay for. It's super reliable and their service is great.

Which other solutions did I evaluate?

I had the opportunity to review Palo Alto and Fortinet.

What other advice do I have?

I'd advise other users to give it a try.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1678710 - PeerSpot reviewer
Senior Cyber Security Consultant at a financial services firm with 10,001+ employees
User
Sep 24, 2021
Great blade technology, easy to configure, and lowers administrative workloads
Pros and Cons
  • "The ease of configuring VPNs can be very useful especially for companies with lots of remote locations."
  • "If you have a long ruleset, you may experience performance issues on the GUI, and installing rule changes on gateways can take a comparatively long time."

What is our primary use case?

We use Check Point Next Generation Firewalls as a perimeter firewall for all sites, including the DMZ, disaster recovery center, and branch offices. We also use IPS, Anti-Bot, Antivirus, Identity Awareness, Application Control, and URL Filtering blades at all gateways. At our main site, these blades provide additional security controls to our existing security solutions. For our branch offices, Check Point Next Generation Firewalls work as unified security products and we do not need to implement additional security solutions.

How has it helped my organization?

In addition to legacy firewall features, by using Check Point Next Generation Firewalls blade technology, you can improve your security. 

By using the smart console, you can control tens of gateways from a single point. The smart console also allows you to control all the blades from the same GUI. These features decrease our manpower needs. 

The identity awareness feature makes it easier to implement and manage firewall rules. 

The ease of configuring VPNs can be very useful especially for companies with lots of remote locations.

What is most valuable?

Check Point Next Generation Firewalls have numerous blade options such as Anti-bot, IPS, and URL filtering. In most cases, one box could be sufficient to use all these blades. You can manage all these blades from a single console. This feature lowers your administrative workload. 

If you have comparatively small branch offices, in addition to administrative workload, instead of spending money for security products such as proxy or IPS, Check Point Next Generation Firewalls could meet your requirements. 

What needs improvement?

If you have a long ruleset, you may experience performance issues on the GUI, and installing rule changes on gateways can take a comparatively long time. 

If you use Check Point firewalls for a long time, it is inevitable to have long rulesets over the years. The need for using different GUI applications for different versions can be confusing. A backward compatibility feature for smart console versions could be useful - especially if you are an enterprise customer, you probably need to use different versions at the same time. 

For how long have I used the solution?

We have used the solution for 9+ years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Administrator at a financial services firm with 10,001+ employees
Real User
Sep 24, 2021
Great protection, very stable, and offers excellent management
Pros and Cons
  • "The firewall rule writing and object creation are the best and simplest I've seen on a firewall."
  • "When we hit a bug, the support team recommends some hotfix, and if we upgrade to that, we have to uninstall it before we apply some newer jumbo hotfix."

What is our primary use case?

We are a financial institution and we use Check Point as a firewall that is positioned for external connections, like the Internet, leased lines, and site-to-site VPNs for other companies. Check Point protects our mobile applications connected to the internet, as well as the main company website. Some firewalls are positioned on some of our HQs.

We're on version R80.40 (some minor firewalls are on R80.30) and we use 13000, 23000, and 26000 series appliances. We use Application Control, Identity Awareness, IPS, URL Filtering, Anti-bot, Antivirus, Threat extraction, and Threat emulation blades.

How has it helped my organization?

I've been in the same company for 11 years, and Check Point has been running in a stable manner for our company's main internet connection (and 7 years before that).

It has protected our main applications successfully without any performance drops, and with its flawless logging capabilities, we were able to pinpoint any issues every time.

The management is also the best among any other firewall, with the convenience to create the objects and rules on the same page. This has helped us save time on operations. We can use APIs to create objects and rules to easily finish some projects.

What is most valuable?

The best features are the stability and the performance of the firewall and its software blades, simplicity to write the firewall rules on its GUI, and its logging capabilities.

The firewalls are working stably, without any interruptions. As we planned our capacity well, we've never had any performance issues.

The firewall rule writing and object creation are the best and simplest I've seen on a firewall (I've looked at 6 different vendors). I often wonder why the other vendors don't do it Check Point's way.

To see the logs, we can search like a search engine, and we can combine different search strings to pinpoint the interesting traffic.

What needs improvement?

The product can be improved with fewer hotfixes, and if more generally available jumbo hotfixes were used.

We don't often hit bugs. It's perfectly normal for an NGFW device as other vendors are always fixing bugs too. However, when we hit a bug, the support team recommends some hotfix, and if we upgrade to that, we have to uninstall it before we apply some newer jumbo hotfix. If those fixes were included in a fast manner in the jumbo hotfix (as jumbo hotfixes are tested thoroughly for general availability), it would be ideal.

For how long have I used the solution?

I've used the solution for 11 years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1678680 - PeerSpot reviewer
Senior Linux Administrator at a transportation company with 1,001-5,000 employees
User
Sep 24, 2021
Simple to scale with a nice management interface and good technical support
Pros and Cons
  • "Many problems have been solved with these firewalls and we've largely been very satisfied."
  • "The predefined reports are few and it would be nice to increase them since the logs are excellent."

What is our primary use case?

Check Point's Next Generation Firewall has definitely improved our organization as we previously used a Linux firewall and we have had to manually configure internet control measures. When it comes to configuring firewall policies it was time-consuming. This has been taken care of by Check Point's Next Generation firewall. Even the integration to the Active Directory has been made to be seamless and requires a minimum effort from our security and network administrators. The technologies that are in place are amazing. For example, the Threat Extraction and Threat Emulation technologies. The Sandbox technology, or Threat Cloud, is world-class.

How has it helped my organization?

The remote access blade functionality is really valuable as we now need to just install the client on the user's machines and the client can be preconfigured with the site details. This makes our lives very simple. The logging of the firewall is also phenomenal as it is very granular and very easy to filter. 

The Application control blade is another valuable feature as we now only need to create a rule to be applied and to specify the applicable application which is categorized. The ability to configure dynamic objects, for example, Microsoft Office 365, is also a valuable feature.

The reports are very detailed and the variety is amazing. It caters to everything and is even more that what we had bargained for. They are also customizable, which makes them extremely valuable to us. 

Another great feature is the ability to publish corporate applications in a secure web environment.

What is most valuable?

Many problems have been solved with these firewalls and we've largely been very satisfied. Thanks to this infrastructure that we have managed, in this pandemic time, to quickly and effectively offer the potential to remotely work for everyone has been good. 

Also important is the separate management interface that has made it possible to carry out even the most operations while comfortably seated at the desk. It provides multiple profiles that you can apply depending on the scenario that presents itself.

What needs improvement?

It takes a while to install the rules so that if you make a mistake you can only fix it after a few minutes. There's no problem with traffic processing. 

Sometimes you are forced to interact on several levels: on the one hand, you put in the rules, and on the other, you put in the route. The predefined reports are few and it would be nice to increase them since the logs are excellent.

In my work experience, I have been able to use multiple firewall platforms. There are only two valid ones for me and one of them is definitely Check Point. The others charge less but there is a reason for that. It is a good idea to think carefully before rather than after you suffer from a serious attack.

For how long have I used the solution?

We have been using the solution for three years now.

What do I think about the stability of the solution?

For me, the solution has been stable. Perhaps running it on a small scale helps.

What do I think about the scalability of the solution?

I like the fact that it's so simple to scale.

How are customer service and technical support?

I find the support to be very prompt. They go the extra mile to assist and are thorough in their troubleshooting.

Which solution did I use previously and why did I switch?

I did not use a different solution, however, I came to know about this product while I was working for a company called Syrex.

How was the initial setup?

It was set up for us by a company I used to work for.

What about the implementation team?

It was through a vendor, and they were very good and did it on time as they promised.

What was our ROI?

A stable and fully functioning solution has enabled us to focus on other aspects of growing the business.

Which other solutions did I evaluate?

I looked at Fortigate, and it was not as clearly defined, and easy to follow as Check Point is.

What other advice do I have?

Check Point does cost a lot, but for me, it's worth the money I paid.

Some of the products are easier to deploy. For example, the Harmony products are simpler as they have a per user/per device pricing model.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.