Try our new research platform with insights from 80,000+ expert users
Suraj Varma - PeerSpot reviewer
Sr. Network Security Engineer at a outsourcing company with 11-50 employees
Real User
Top 5Leaderboard
Jul 30, 2024
Good analysis and integration with an easy deployment
Pros and Cons
  • "It gets a regular zero-day signature update."
  • "During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line."

What is our primary use case?

My company is an IT service provider. We suggest customers choose the Check Point next-generation firewall along with other OEMs for their environment. Once they choose (and confirm the product with model capabilities), we migrate the existing firewall to the new firewall. 

I have deployed multiple Check Point products. Based on my experience and its effective features, I do suggest customers go with Check Point NGFW. I love its security profiles which effectively secure the organization's LAN, DC, and DMZ network.

How has it helped my organization?

The solution has improved organizations via:

1. Ease of deployment: We can easily implement and deploy the check Point NGFW.

2. Deep Inspection: It inspects traffic beyond just port number and IP address.

3. Threat Prevention: It has multiple security features and we can enable and integrate these features like IPS(Intrusion Prevention System), Anti-Bot Protection, and SandBoxing.

4. Organizations can enable Multi-Factor Authentication (MFA) in their network environment to verify their identity before they access the network. this feature keeps the integrity of the LAN network.

What is most valuable?

My favorite feature of Check Point NGFW is its "deep traffic inspection capability" due to the fact that:

1. It provides deep-level control over the network activity, allowing you to prioritize critical traffic first based on organization requirements.

2. It analyzes application behavior to detect suspicious activity.

3. We integrate with Sandbox technology to safely detonate and analyze zero-day threats. 

4. It also blocks the application and prevents them from accessing the organization's LAN network.

5. It gets a regular zero-day signature update.

What needs improvement?

During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line. 

Check Point runs on Linux and its command line is Linux-based. However, at the time, I was not familiar with Linux commands, and I invested lots of time in finding the Linux command and understanding the meaning, then went for troubleshooting.

It would be very helpful if the OEM provided all the Linux commands in a way that we could easily understand and follow the steps to configure or troubleshoot the issue using the command line.

Buyer's Guide
Check Point Quantum Force (NGFW)
January 2026
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

For how long have I used the solution?

For the last year, I have been implementing and deploying Check Point NGFW in multiple client environments. 

Its NAT automation and routing intelligence are excellent. We are not required to configure NAT rules separately; we can enable them while creating an object. We are also not required to configure reverse routing for LAN subnets.

What do I think about the stability of the solution?

At this time, Check Point NGFW is more stable than other options.

What do I think about the scalability of the solution?

The scalability is wonderful.

How are customer service and support?

Customer service and support are good. However, they can be enhanced.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We do not choose the solution. Rather, we provide multiple solutions to the customer.

How was the initial setup?

The solution is easy to implement.

What about the implementation team?

We are from the vendor side. We can help implement the solution. 

What's my experience with pricing, setup cost, and licensing?

As of now, everything is good as per the market scenario.

Which other solutions did I evaluate?

We did not evaluate other options. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. My company is an IT service provider. So we implement, deploy, and migrate the NGFW in various customer environments.
PeerSpot user
reviewer1591110 - PeerSpot reviewer
ICT at a manufacturing company with 501-1,000 employees
Real User
Top 10
Aug 20, 2025
Provides a central point for security log management and enhances organizational security
Pros and Cons
  • "Check Point Quantum Force (NGFW) has positively impacted my organization because it is our core security system, and it performs effectively."

    What is our primary use case?

    My main use case for Check Point Quantum Force (NGFW) is that we use it for a perimeter firewall and separation firewall.

    What is most valuable?

    The best features Check Point Quantum Force (NGFW) offers are that it's a good product with a lot of features and a great GUI interface to manage it.

    The interface of Check Point Quantum Force (NGFW) stands out because in a single point, I can read all the logs of my device.

    Check Point Quantum Force (NGFW) has positively impacted my organization because it is our core security system, and it performs effectively.

    What needs improvement?

    At the moment, I haven't any ideas on how Check Point Quantum Force (NGFW) can be improved.

    For how long have I used the solution?

    I have been using Check Point Quantum Force (NGFW) for about ten years.

    What do I think about the stability of the solution?

    Check Point Quantum Force (NGFW) is very stable.

    What do I think about the scalability of the solution?

    For our company, Check Point Quantum Force (NGFW) is scalable enough.

    How are customer service and support?

    We reached out for customer support and received the correct support, the support that we needed.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before Check Point Quantum Force (NGFW), we used an old Check Point firewall.

    What was our ROI?

    I don't have information on whether we have seen a return on investment with Check Point Quantum Force (NGFW).

    What's my experience with pricing, setup cost, and licensing?

    I don't know the price because I only made the technical decision, but I spoke about the price with my manager.

    Which other solutions did I evaluate?

    We stayed with Check Point and did not evaluate other options before choosing Check Point Quantum Force (NGFW).

    What other advice do I have?

    I would rate Check Point Quantum Force (NGFW) a nine out of ten because I think we can improve the product a little bit.

    My advice to others looking into using Check Point Quantum Force (NGFW) is that it is a good product and can solve a lot of security problems in your company.

    My company does not have a business relationship with the vendor other than being a customer, as we are an end user.

    I was offered a gift card or incentive for this review.

    I prefer not to use my real name or company name when publishing my review.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Aug 20, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Quantum Force (NGFW)
    January 2026
    Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    881,082 professionals have used our research since 2012.
    JayPrajapati - PeerSpot reviewer
    Senior Network Security Engineer at a tech services company with 51-200 employees
    Real User
    Top 5
    Jun 24, 2024
    Easy to identify the logs and well managed because of the threat cloud architecture
    Pros and Cons
    • "Another thing I like is that whenever we make changes on the firewall, we first need to publish them and then install the policies. This allows us to double-check the policies before they are implemented, which is helpful."
    • "We faced many challenges. For example, an issue with the managed view that Check Point has."

    What is our primary use case?

    Check Point is mainly used for internal communication. Our clients have multiple platforms, and customers use it for internal communications and protection, from the DMZ to the LAN to the DMZ, and also for MPLS connectivity with multiple branches. 

    As I've seen, the customers also use it as a gateway for publishing their website. This is only for the perimeter, however.

    What is most valuable?

    It is very easy to identify the logs. It is also very well managed because of the threat cloud architecture. 

    Another thing is that whenever we make changes on the firewall, we first need to publish them and then install the policies. This allows us to double-check the policies before they are implemented, which is helpful.

    What needs improvement?

    We faced many challenges. For example, an issue with the managed view that Check Point has. When clicking on a rule, we are supposed to have a full view of that rule and its log portion. This should show what's passing through the rule, what's coming to the rule, and all of that on a single pane of glass. Currently, the log isn't showing when we click on a particular rule. This might be an issue with an upgrade or something. Because of this, we can't implement anything on the live system; we only have a maintenance window every weekend, and it's hard to troubleshoot within an hour.

    Another problem is that when we created around two lakhs of Check Point objects on the firewall, it became very slow.

    For how long have I used the solution?

    I have been using it for two months. 

    What do I think about the stability of the solution?

    It is not slow. But, we implemented two lakhs of objects on the firewall, and that caused the slowness. It can happen with all firewalls, not only Check Point.

    What do I think about the scalability of the solution?

    Currently, I work with enterprise customers.

    How are customer service and support?

    It was good. No issues with that.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I can recommend Check Point, Fortinet, and even SonicWall. 

    I come from a system integrator background, we first understand the customer's requirements before suggesting a firewall. Sometimes we aggressively push SonicWall because the user's requirements are more aligned with SonicWall. That's how we propose solutions.

    How was the initial setup?

    It is very easy to install, not that complicated.

    The complexity and time depend on the customer's requirements.

    No maintenance: In the past two months, we haven't faced anything that required replacements on the firewall.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is good. The price is very reasonable for enterprise customers.

    It offers average pricing. Previously, I worked as a system integrator, and we faced some cross-product environments where Check Point was quite costly compared to the product we were working with.

    What other advice do I have?

    Overall, I would rate it an eight out of ten. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Sr. Cyber Security and Solutions Architect at a consultancy with 201-500 employees
    Real User
    Top 20
    Nov 17, 2024
    Robust security and seamless integration enhance classified application management
    Pros and Cons
    • "One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access."
    • "I would absolutely recommend this solution to others for its robust security and scalability."
    • "The graphical user interface (GUI) could benefit from some updates."

    What is our primary use case?

    We use the Check Point Next Generation Firewall for whitelisting and blacklisting of addresses. It's part of our identity management solution and is utilized for inbound and outbound traffic services. 

    Additionally, it is integrated with our DMZ, managing traffic from an IP addressing scheme. We also use it for monitoring different types of classified and nonclassified applications.

    How has it helped my organization?

    Check Point has improved our organization's ability to manage both classified and nonclassified applications securely, ensuring they pass through multiple layers of security within our firewall infrastructure.

    What is most valuable?

    One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access. It provides robust security across classified and nonclassified applications and integrates well with our existing infrastructure.

    What needs improvement?

    The graphical user interface (GUI) could benefit from some updates, although it is generally satisfactory in its current form.

    What do I think about the stability of the solution?

    The solution is stable, and I have the utmost confidence in its software stability.

    What do I think about the scalability of the solution?

    The application is very scalable, allowing us to manage security across different network layers and support various applications and activities.

    How are customer service and support?

    Customer support quality depends on the person you interact with. However, the support team we engaged was knowledgeable and well-versed with the application, allowing us to resolve any potential issues effectively.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We switched to Check Point due to cost and maintenance benefits. The previous solutions required significant resources to handle network and communication alignment during upgrades.

    How was the initial setup?

    The initial setup is straightforward, with no significant issues arising from the box configuration.

    What about the implementation team?

    Our implementation team comprised about thirty individuals, including supervisors for each stage, to manage testing, validation, staging, and production.

    What was our ROI?

    We conducted a detailed analysis and determined a high return on investment. Maintenance and stability were key factors contributing to a favorable ROI.

    What's my experience with pricing, setup cost, and licensing?

    We found the pricing reasonable, ensuring the product was not overpriced. However, I am not familiar with the exact cost details.

    What other advice do I have?

    I would absolutely recommend this solution to others for its robust security and scalability.

    I'd rate the solution ten out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    SUNNY-KUMAR - PeerSpot reviewer
    Technical engineer (SOC Analyst) at a tech services company with 10,001+ employees
    Real User
    Top 5
    Nov 13, 2024
    Efficient firewall management enhances network protection, though rule creation could be smoother
    Pros and Cons
    • "The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network."
    • "Check Point NGFW makes it easier to handle and use the firewall efficiently."
    • "In the rule creation process, we need to decide on the source address, destination address, and services. There are improvements needed in this area."
    • "Check Point NGFW is not scalable enough."

    What is our primary use case?

    We use Check Point NGFW to provide more protection for our network from internal and external sources. I also work on creating checks, rules, troubleshooting, and generating daily reports.

    How has it helped my organization?

    Check Point NGFW makes it easier to handle and use the firewall efficiently. It helps protect our network from internal and external threats.

    What is most valuable?

    The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.

    What needs improvement?

    In the rule creation process, we need to decide on the source address, destination address, and services. There are improvements needed in this area.

    For how long have I used the solution?

    I have used Check Point NGFW for one and a half years.

    What do I think about the stability of the solution?

    To maintain stability, I monitor high utilization and CPU usage, enabling and disabling connections as necessary.

    What do I think about the scalability of the solution?

    Check Point NGFW is not scalable enough. However, it enhances performance with high availability, shifting to a secondary firewall if one fails.

    How are customer service and support?

    When I can't resolve an issue technically, I consult with a senior engineer. I rate the technical support seven out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I did not work with any other firewalls before Check Point. I am familiar with CCNA routing and switching.

    How was the initial setup?

    The initial setup involves connecting cables, opening the IP address using a browser, and configuring the firewall. It takes about one hour.

    What about the implementation team?

    Only one person is required for the deployment.

    What was our ROI?

    Check Point NGFW is very important because it is easier to handle and use.

    What's my experience with pricing, setup cost, and licensing?

    I don't have information regarding the pricing, as it is considered an internal matter of the organization.

    Which other solutions did I evaluate?

    I did not evaluate any other options. I chose Check Point firewall based on my knowledge of CCNA routing and switching.

    What other advice do I have?

    Check Point NGFW is easy to use, create rules, and take backups. It simplifies backing up and managing processes with click-and-go options.

    I'd rate the solution seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer2540445 - PeerSpot reviewer
    Student at a university with 5,001-10,000 employees
    Real User
    Top 5
    Sep 10, 2024
    Integrates with with Active Directory, IPS, standard VPN, and the firewall
    Pros and Cons
    • "Integration with Active Directory, IPS, standard VPN, and the firewall itself are the most valuable features for us. We haven't yet certified or aren't using Application Control, anti-bot, or anti-virus features."
    • "Significant improvements have been made in the product. I started working with the R65 code and then upgraded to R74.40. When they transitioned from R77.30 to R80.x, they made major back-end modifications, switching from a flat file system to Solaris and Postgres. This was a big step that neither customers nor their support staff were fully prepared for."

    What is our primary use case?

    We needed stateful inspection, logging, integration with Active Directory, and the ability to monitor devices using standard SNMP for use cases. Now, with the tool's Skyline product and OpenTelemetry, we can monitor it through Prometheus and Grafana. It has all the features we needed when we certified the solution.

    What is most valuable?

    Integration with Active Directory, IPS, standard VPN, and the firewall itself are the most valuable features for us. We haven't yet certified or aren't using Application Control, anti-bot, or anti-virus features.

    What needs improvement?

    Significant improvements have been made in the product. I started working with the R65 code and then upgraded to R74.40. When they transitioned from R77.30 to R80.x, they made major back-end modifications, switching from a flat file system to Solaris and Postgres. This was a big step that neither customers nor their support staff were fully prepared for.

    Now, they're adding more features due to the increased flexibility of the new back-end. The main improvement I'd suggest is better preparation when introducing new features. Before releasing, they must train their support staff to troubleshoot these new features. The transition from R77.30 to R80.x was problematic due to a lack of preparation by Check Point, customers, and support.

    What do I think about the scalability of the solution?

    Sizing is crucial, but we've never had issues with the products we've sized for each environment. The Maestro solution provides a lot of flexibility. On a scale of one to ten, with ten being the highest scalability, I'd rate it a ten.

    Which solution did I use previously and why did I switch?

    I use Palo Alto firewalls. Check Point NGFW was the first to invent the stateful inspection firewall. They focus more on security and try to keep their motto of "keep security simple". They don't get bogged down in marketing or complicated terminology when using their products.

    Even enabling a firewall blade on Palo Alto requires learning about different sync ports, how sync ports differ between chassis, and navigating through multiple GUI tabs for configuration. It's not as straightforward.

    On the other hand, Check Point NGFW has kept things very simple for deployment. You set it up once, and then you can repeat the same process repeatedly.

    How was the initial setup?

    On a scale of one to ten, with ten being the easiest, I'd rate the initial setup as ten. The process is straightforward: you rack and stack, configure the management code, create a standard policy, establish SIC, and push the policy. This process has remained consistent over the years.

    For deployment, it took us longer than the typical two weeks because we had to design solutions for different scenarios. Check Point offers various options, such as clustering solutions, Maestro solutions, and standalone solutions. We had different use cases—some required standard clusters with ClusterXL, while others needed scalability solutions like Maestro. We also had to factor in sizing considerations.

    The certification process took about the same amount of time as other products. We've been using the Maestro solution for a while now, so when new platforms are released, there isn't much change required beyond certifying the new hardware and ensuring backward compatibility with our certified solution.

    Initially, it took a little more than two weeks to certify. However, the actual deployment still follows the same standard process and is actually easier now than it was in the past.

    We call the team responsible for deploying certified solutions to the service delivery team. It's made up of two groups: build services and service delivery. The build services team works with our networking team to ensure our network and peering devices are set up right to host the firewall.

    The service delivery team focuses more on the firewall itself. We need about three or four extra people from build services for firewall deployment. They act as go-betweens with the network team, ensuring our firewall solution works well with the peering devices when we put it in place. The build services team is important because they ensure everything fits together properly when we set up our firewall.

    For maintenance, the solution is pretty stable. We have a global team, but a separate team handles regular firewall changes and daily operations. For support, we have about ten people total - three groups of three people each. This team manages around 1200 firewalls, including Check Point and Palo Alto devices.

    What's my experience with pricing, setup cost, and licensing?

    Check Point NGFW is much cheaper than other platforms, including Palo Alto. Its scalability, especially with the Maestro solution, is a big advantage. If you're looking for good security at a reasonable price with a good return on investment, I believe Check Point NGFW is the way to go.

    What other advice do I have?

    I've been dealing with Check Point NGFW for my entire career. I started with their Stateful Inspection feature. The term "Next Generation Firewall" is just marketing. Check Point's UTM product was designed from the ground up with next-generation features. They have a feature called Blaze. Besides stateful inspection firewalls and VPNs, they offer IPS, application control, URL filtering, antivirus, and antibot. You can also integrate it with third-party tools like Active Directory for authentication. This combination of features is what's called a next-generation firewall.

    Other vendors use terms like app ID or user ID. They focus less on ports and more on ensuring services match their intended use. For example, if port 22 is enabled, it should be for SSH service, not something else. We use both Check Point NGFW and other products. I think if you commit to one vendor's approach, it can be hard to switch late.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Sathiyan Harikrishnan Anusuya - PeerSpot reviewer
    Security Analyst at a consultancy with 10,001+ employees
    Real User
    Top 5
    Aug 16, 2024
    A robust solution that can handle heavy workloads and user traffic well
    Pros and Cons
    • "The solution is robust and can handle heavy workloads and user traffic well. The product is good."
    • "The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN."

    What is our primary use case?

    We use Check Point NGFW as our data center and branch location firewalls.

    What is most valuable?

    The solution is robust and can handle heavy workloads and user traffic well. The product is good. 

    What needs improvement?

    The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN.

    For how long have I used the solution?

    I have been working with the product for ten years. 

    What do I think about the stability of the solution?

    I rate the product's stability an eight out of ten. 

    What do I think about the scalability of the solution?

    I rate the tool's scalability an eight out of ten. My company has 5000 users. 

    How was the initial setup?

    The initial setup can be complex, especially for BGP configurations. I'd rate it a five out of ten for ease of setup. It's neither too hard nor too easy - it depends on your requirements. We deployed it on-premises. The initial deployment of our enterprise-grade device took about three months. We need about two people for maintenance, mainly for operational changes when needed.

    What about the implementation team?

    We mostly did the deployment ourselves, with some professional services support from Check Point. Three to four people were involved in the deployment, including one from Check Point to validate our work.

    What other advice do I have?

    The Harmony bundle is interesting, with many new features, but we're not evaluating it much as we're moving to FortiGate. We're not planning to increase the usage of Check Point NGFW. We're looking into SD-WAN and moving towards FortiGate.

    I rate the overall solution an eight out of ten. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Bikash Biswas - PeerSpot reviewer
    Managing Director at a tech services company with 1-10 employees
    Real User
    Top 20
    Aug 28, 2024
    A good firewall that provides protection against malware
    Pros and Cons
    • "The solution's most valuable feature is CDR (content disarm and reconstruction)."
    • "I want better (DPI) Deep Packet Inspection in Check Point NGFW."

    What is our primary use case?

    My customer is one of the big banks in Bangladesh, and they use the solution to protect themselves from malware.

    What is most valuable?

    The solution's most valuable feature is CDR (content disarm and reconstruction). The Infiniti Portal feature helps manage the firewall and get a proper report, which is required for management. Capacity and Maestro are good features that can produce better firewall speed.

    What needs improvement?

    I want better (DPI) Deep Packet Inspection in Check Point NGFW. The solution should include some behavioral features to detect the malware smartly.

    What do I think about the stability of the solution?

    Check Point NGFW is a very stable solution.

    I rate the solution’s stability nine and a half out of ten.

    What do I think about the scalability of the solution?

    Around 20 small and medium businesses are using the solution. The solution's scalability is really good. It has a feature called Maestro, which can increase bandwidth by three terabytes.

    I rate the solution's scalability an eight out of ten.

    How are customer service and support?

    The solution provides good technical support.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup an eight out of ten.

    What's my experience with pricing, setup cost, and licensing?

    Check Point NGFW is not a cheap solution. Customers often need to pay a premium for its services.

    On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.

    What other advice do I have?

    Check Point NGFW is a good firewall. You can mount it into your firewall in every country and have the report. You can find out how good it is. Customers can change this firewall or determine the efficiency of other firewalls, including Check Point. After 15 days, they can see the report, which is a good feature.

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. consultant
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: January 2026
    Buyer's Guide
    Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros sharing their opinions.