The solution is used to provide firewall security to cloud integrations.
Network Security Engineer at a comms service provider with 51-200 employees
Offers a vital anti-spoofing feature but needs to upgrade the IPSec VPN port
Pros and Cons
- "The spoofing prevention feature is the most valuable feature."
- "Needs to upgrade the IPSec VPN port"
What is our primary use case?
What is most valuable?
The spoofing prevention feature is the most valuable feature.
What needs improvement?
The solution provider needs to upgrade the IPSec VPN port because VPN branch-to-branch configuration can be easily implemented at our company, but several difficulties arise in a cloud environment like AWS or Azure cloud. The aforementioned cloud providers often need to create VPN interfaces, but in a few cases, these teams don't have the knowledge for configuration or IP points; their knowledge remains limited to the architecture of the clouds on a networking level.
In future releases of the solution, a remote access VPN feature should be added. Our organization expects the aforementioned feature because we have a secure validated configuration in our remote access VPN, and the feature would allow easy configuration.
For instance, if a customer wants to connect a VPN to a particular domain laptop, our company can integrate the domains with our network's remote access VPN, but the user is unable to connect with other personal laptops.
For how long have I used the solution?
I have been using Check Point NGFW for five years.
Buyer's Guide
Check Point Quantum Force (NGFW)
September 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the stability of the solution?
I would rate the stability of the solution as seven out of ten. The tech support is not operational sometimes, and in a few cases, the tech team of the vendor is unable to provide support with a proper explanation or resolution. Check Point NGFW fails to provide workarounds for certain issues and thus leads to huge time consumption for a single task. The support team of Check Point NGFW on a few occasions takes five to ten hours to resolve an urgent VPN issue which impacts the stability.
At our company, if we raise an RMA for Check Point NGFW, it takes immense time, which is around 15 to 30 days, to obtain the box, whereas other vendors offer it within five to seven business days. Due to the aforementioned issue, our organization needs to implement a test device on the environment and purchase temporary licenses for that device so that the customers in a stand-alone environment can access the internet.
In Check Point NGFW, sometimes the logs consume excess storage, and even the storing or indexing process is not implemented correctly.
What do I think about the scalability of the solution?
I would rate the scalability a seven out of ten.
How are customer service and support?
Support is available for Check Point NGFW, but the support team, in most cases, is unable to provide an effective and on-time solution after collecting logs. I would rate tech support a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I worked with Palo Alto previously before transferring to Check Point NGFW. I wanted to learn about Check Point NGFW in-depth as it's considered a difficult solution compared to others, so I ventured into it.
How was the initial setup?
In our company, we have the option for both cloud-based and on-prem deployment of the solution. The management server integration is different for the aforementioned options. If the traditional management server is present locally, in that case, at our company, we are using the solution for integration, but if a cloud is involved, some keys need to be integrated with the cloud management to let the firewall have internet access.
Almost every time when the management server reaches or expands to another country in our organization, we face difficulty with integrations. The deployment time of Check Point NGFW depends upon customer requirements, but it takes approximately 15 to 30 days. More feature integrations demand the involvement of more teams in the deployment process. In my area of business, about 50 to 70 customers are using Check Point NGFW.
If the solution is in a cluster environment, a maintenance window is not required and most of our customers are using the solution in a clustering or stand-alone mode.
What's my experience with pricing, setup cost, and licensing?
It's an expensive solution.
What other advice do I have?
Most of our organization's customers are using Check Point NGFW for networks, as enhancing the firewall's performance is not required; if the firewall goes inactive, total protection decreases. Our organization's customers don't want to depend on any particular product and are thus investing in multiple security products.
On a few occasions, integrating a RADIUS configuration with Check Point NGFW has been difficult because some versions are not supported. I have also faced trouble regarding authentication when integrating Check Point NGFW with Azure EAD.
Recently, Check Point NGFW has been integrated with zero-threat AI security features. In our organization, we are installing the solution on the Blade architecture, where the aforementioned features function well enough. I would recommend Check Point NGFW to others. I would rate Check Point NGFW overall a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.

Presales IT solutions at ICCO
Monitors traffic well, is user-friendly and offers a good dashboard
Pros and Cons
- "The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events."
- "Timely updates to security databases, firmware, and software are crucial for addressing new threats."
What is our primary use case?
We are using the product in a small office to secure our network to configure the firewall settings to control incoming and outgoing traffic.
This includes setting up rules for allowing or blocking specific types of traffic.
We use intrusion prevention features to detect and prevent potential threats and attacks on your network.
It enables logging and monitoring features to keep track of network activity and identify potential security incidents.
With the solution, we can implement strong user authentication mechanisms to control access to your network resources.
How has it helped my organization?
The use of Check Point NGFW makes our business feel safer.
NGFWs typically include advanced threat prevention mechanisms, such as intrusion prevention systems (IPS), antivirus, anti-malware, and threat intelligence. These features help protect your network from a wide range of cyber threats.
NGFWs can integrate with user identity management systems, enabling more granular control over network access based on user identities. This is particularly important for enforcing security policies on a per-user basis.
What is most valuable?
The interface is user-friendly, and also they give you small training courses on the Coursera website to explain how to use the products.
The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events. This helps administrators get a snapshot of the network's security posture.
The ability to monitor network traffic and security events in real time is crucial. Check Point's interface often provides real-time visibility into network activity, making it easier to identify potential issues or threats.
What needs improvement?
Their products are pretty complete, and the explanations are very well done.
Check Point offers training and certification programs for administrators and security professionals. These programs help individuals develop the skills needed to effectively manage and secure networks using Check Point products.
Timely updates to security databases, firmware, and software are crucial for addressing new threats. Check Point's commitment to providing ongoing support ensures that organizations have access to assistance when needed.
For how long have I used the solution?
We have been using this solution for the last two years already.
What do I think about the stability of the solution?
The solution we use is pretty complete. For the moment, the stability is good enough for us.
What do I think about the scalability of the solution?
CkeckPoint has solutions for different sizes of companies. Therefore, the solution is scalable. The client has to choose the right solution for their needs. If you call the contact center, they can advise you on your options.
How are customer service and support?
We have not used technical support, up until now we haven't needed them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a normal antivirus on the endpoints previously. However, after we took a cybersecurity course, we understood that a bigger security solution was needed.
How was the initial setup?
The initial setup is easy. You just click through, next, next, next, and take some steps to make an account and do some basic setups. Everything basically works out of the box.
What about the implementation team?
We implemented the solution through a vendor team; they had well-trained technicians.
What was our ROI?
To feel safer in the online environment is the most important thing these days. Everything is online now. A solution like that makes it easier and safer for you to work and do things online.
What's my experience with pricing, setup cost, and licensing?
After researching what's available in the market, choose a product. Read reviews and watch demos to assess the user interface and learn what options the product offers.
Which other solutions did I evaluate?
We searched the market for months before we chose Check Point. There are many security solutions on the market, both for on-premises and on the cloud. We chose Check Point for the ease of use.
What other advice do I have?
The solution is perfect for us. That said, for each client, the needs are different.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Quantum Force (NGFW)
September 2025

Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Sr. Network Engineer at Tekboox
Enables us to create configuration templates but there is room for improvement
Pros and Cons
- "I primarily work on the network side, so my expertise lies in configuring and working with firewalls. I have experience in firewall policies and know how to configure them within CheckPoint, including blocking URLs and specific website categories. However, I acknowledge that there's room for improvement, particularly in areas related to application-level control within the firewall. While I can't pinpoint a specific area for improvement, I am trying open to enhancing my skills and knowledge in various aspects of firewall management."
What is our primary use case?
I am currently working with Check Point Firewall because most of your customers have it deployed in their networks. Recently, we were involved in a significant firewall micro-implementation for one of our customers. We created configuration templates, specifically for routing and setting up bond interfaces within CheckPoint. These interfaces are similar to Cisco's port channels, where multiple physical interfaces are bound into one.
What needs improvement?
I primarily work on the network side, so my expertise lies in configuring and working with firewalls. I have experience in firewall policies and know how to configure them within Check Point, including blocking URLs and specific website categories. However, I acknowledge that there's room for improvement, particularly in areas related to application-level control within the firewall. While I can't pinpoint a specific area for improvement, I am trying to enhance my skills and knowledge in various aspects of firewall management.
For how long have I used the solution?
I have been using Check Point NGFW for the last 12 months.
What do I think about the stability of the solution?
During a project where I was working with a customer deploying Maestro in their network, we encountered an issue related to multicast traffic. Check Point's expert team suggested that we install a package called Jumbo Hotfix inside the Check Point, which resolved the problem. Overall, despite this issue, Check Point NGFW is a stable product with minimal encountered bugs.
Which solution did I use previously and why did I switch?
Check Point is a stable product, but when compared to other vendors like Palo Alto and Fortinet, I'd recommend going with Palo Alto. Palo Alto is a more stable and robust firewall solution than Check Point.
How was the initial setup?
The deployment of Check Point was straightforward. In the Azure cloud environment, it took approximately thirteen minutes to complete the deployment, while on-premises, the initial setup was relatively easy and not complicated. I have deployed Check Point both on-premises and in the Azure cloud. The deployment in Azure took place around four months ago for a customer's proof of concept (POC). The primary reason for this deployment was to address the customer's VPN subnet limitations with Azure VPN. I suggested that moving to a cloud-based CheckPoint solution would provide better VPN connections without IP subnet limitations. In the Azure deployment, I created a hub and VPN and deployed two CheckPoint instances, not just one. To manage these instances, I used a load balancer within the Azure network.
What other advice do I have?
Regarding firewalls, my role primarily involves designing and deploying them, then handing over the management to the operations team. While I find the deployment process relatively easy, the issues the operations team faces later on can impact my perspective. I'd rate Check Point a 7 out of 10. The ease of deployment is a plus, but we've encountered some problems with Check Point, particularly related to documentation. Compared to vendors like Cisco and Juniper, the quality and comprehensiveness of the documentation could be improved.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Reseller
Senior Ts Systems Integration Specialist at NTT Security
User-friendly with good dashboards and helpful support
Pros and Cons
- "The Check Point firewall features for Next Generation Firewalls are excellent."
- "Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and auditors are forced to have the latest possible environments."
What is our primary use case?
Our customer has been the best in stock trading; they observed that in peak hours or business hours buying and selling the stocks was time-consuming.
When they reached out to the firewall team, we checked the disk space, memory, and HDD we didn't notice much difference.
However, we monitored the interface utilization, and 1 GB was choking up and being consumed. The cpstat status on the interface level monitor and bundling the multiple interfaces fixed the issue.
How has it helped my organization?
We have been fixing the performance and also found that the solution offers:
1. A user-friendly dashboard with all the information available in front view and we view according to our requirements in graphical, statistically, etc.
2. Check Point firewall can combine all locations in one Check Point management console so that we can monitor everything with alert configuration.
3. We have multiple options for SIC resetting.
4. We can monitor the complete organization (for RAM, Memory, Disk, and CPU) and alert handle monitoring. We can now easily handle failovers.
What is most valuable?
The Check Point firewall features for Next Generation Firewalls are excellent. Through scripts, we can easily push firewall rules, extract, and import as per availability. Scripting is the best way to support the firewall functionality and it's been supported by all major versions. We can monitor all types of logs (traffic logs, management logs, and active logs).
The firewall is EDR-supported; we can block or allow the URLs as per phishing or detection.
Firewall flow and logs analysis is awesome.
What needs improvement?
Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and auditors are forced to have the latest possible environments.
Check Point's major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.
As for deployment, we follow best practices for long-term support services. Tools must be introduced and supportive in analyzing the data, flow, and threats. We have to introduce the scripting part to work seamlessly.
For how long have I used the solution?
I've been using the solution for more than ten years.
What do I think about the stability of the solution?
The stability offers high performance.
What do I think about the scalability of the solution?
The scalability offers high performance.
How are customer service and support?
The support is the best in the marketplace.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution. It's the best in the marketplace and stronger than any other firewall. We can trust it 100%.
How was the initial setup?
The initial setup was complex.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
Definitely, every sector [banks, finance, corporate, etc] should have a Check Point Firewall for strengthening/securing the environment.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flat Earth Networking, Inc. at Cyber Security Engineer
Good logging and searchability with useful free trial licenses
Pros and Cons
- "Being able to search in clear text is simple for the customer and for troubleshooting an environment."
- "It's too expensive for mid-market companies."
What is our primary use case?
We have multiple customers that use this product. Integrated logging is the best around.
It's clear and does the job it's supposed to do.
We typically install this as the network edges and encourage our customers to have one at each location. Some prefer to backhall the smaller sites to the main branch where it handles all the inspection and rules.
We also set up multifactor SSL VPN solutions at the main location which allows visibility into remote worker traffic. Overall, it's used mostly by small to medium businesses.
How has it helped my organization?
We have been able to sell this product for a long time as it's highly rated and has a deep feature set. We have probably sold millions of dollars worth of Check Point products over the years.
When the customer comes to us wanting the most protection we typically suggest Check Point first. Our engineers enjoy being able to quickly deploy a solution and have the familiarity with the product to be able to troubleshoot it quickly once it's deployed. For the most part, we train our customers to be able to manage it themselves.
What is most valuable?
Mostly the logging features of the Check Point NGFW are the most valuable. Being able to search in clear text is simple for the customer and for troubleshooting an environment.
I also like that you can get trial licenses for just about every product solution. This allows us to suggest a feature, implement it, and then show the customer that it has value. We tend to retain the customer on that product for the long term once it has been deployed and they are able to see what it's doing to protect them.
What needs improvement?
The only thing holding it back is the price. It's too expensive for mid-market companies. There are other platforms that have emerged that have a similar feature set, however, are more difficult to deploy. This is really only a problem for the engineers as the customer doesn't care how many hours the engineer has to put in to make it work in their environment. If the Check Point product came in at a lower price point it would make it easier for the customer to see the value in cost, thus making it easier for us to sell.
For how long have I used the solution?
I've used the solution for seven years.
What do I think about the stability of the solution?
It has been the most stable for a long time. That track record is something that you can show the customer.
What do I think about the scalability of the solution?
The product is highly scalable especially if you integrate the orchestration solution.
How are customer service and support?
Support is hit or miss lately. They have lost too many good reps to other companies.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used other solutions, however, we continue to use Check Point NGFW.
How was the initial setup?
The initial setup is simple once you have the appropriate infrastructure setup. Once Check Point gets away from the central management solution and allows for on-box management it will make small businesses happier.
What about the implementation team?
I am part of the vendor team. We do a good job implementing it, although sometimes it takes too much time to deploy a product.
What was our ROI?
We tell the customer that the ROI is the protection they are receiving and the stability of the product.
What's my experience with pricing, setup cost, and licensing?
We tell customers truthfully it's the best product, however, it has the highest cost and you'll pay for each license.
Which other solutions did I evaluate?
We are always evaluating other solutions for our customers. Palo Alto and Fortigate are the top two others at the moment.
What other advice do I have?
They just need to get the pricing down or do a better job of bundling the licensing.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a reseller
Security Consultant at a real estate/law firm with 1,001-5,000 employees
Enhanced functionality with challenges regarding resource efficiency
Pros and Cons
- "Its functionality is highly satisfactory."
- "While it does enhance network security, it tends to consume substantial resources, including CPU, memory, and storage."
What is our primary use case?
The primary distinction between an NG Firewall and a traditional firewall lies in their configuration flexibility and scalability. Regarding options and features, the spoofing functionality in Check Point has been instrumental in enhancing security in our critical environment. It plays a crucial role in securing our internet connectivity.
What is most valuable?
Its functionality is highly satisfactory. In the newer Check Point version, there are additional features in VPN and IP security that enhance tunnel security. This flexibility extends to the Check Point MDM platform, allowing for streamlined management across different domains. In my current client's complex infrastructure, there's often a need to replicate rules from one firewall to another within the same room. With Check Point, it's a straightforward process of creating the rules in one policy and then easily copying and pasting them into other policies.
What needs improvement?
The log management process in MDS consumes a significant amount of storage, so it would be highly beneficial if there's an opportunity to optimize these logs and save storage space. While it does enhance network security, it tends to consume substantial resources, including CPU, memory, and storage. It could be an exceptionally useful and efficient solution if there were outgoing or AI-driven algorithms to streamline log management and periodically delay the logs.
For how long have I used the solution?
I have been working with it for almost four years.
What do I think about the stability of the solution?
Regarding stability, I would rate it seven out of ten. While there have been occasional issues like false positives and blocking misreads in my NGFW, overall, it's a good product.
What do I think about the scalability of the solution?
In terms of scalability, I would rate it seven out of ten.
How are customer service and support?
The level of support provided depends on the specific contract. With a premium contract, it gets you treated as a top-priority customer, and they respond promptly, making every effort to find solutions. If you have a standard support contract, your experience might be more like that of an ordinary customer. In general, I've found them to be helpful, and I would rate their support six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I was working with Palo Alto for a couple of years, and I found their data protection functionality to be particularly interesting. I believe this feature is quite innovative and that other vendors should consider taking inspiration from it.
How was the initial setup?
When it comes to the setup process, I've noticed that publishing and informing policies in different steps can be a bit complex. The typical sequence of publishing policies, configuring them, and then deploying them to the firewall can feel suboptimal at times. There are situations where an immediate policy installation is needed and it would be beneficial if there were options to install policies directly before the publishing step. Overall, the setup process is not overly complex, but it's not as straightforward.
What's my experience with pricing, setup cost, and licensing?
When it comes to the quality-price ratio, I've found that Check Point offers a competitive balance in the market. I would rate it four out of ten.
What other advice do I have?
I would rate it six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at Pevans EA Ltd
Good intrusion prevention and virtualized security with remote access VPNs for partner sites
Pros and Cons
- "Check Point offers virtualized systems, making it easy to scale."
- "Currently, upgrades are quite cumbersome."
What is our primary use case?
We've used the solution for perimeter and DMZ security as we host a website that is accessible online.
On the perimeter, we have Check Point acting as the entry point to our web server farm with load balancers. The access policy is configured with the least privilege, only allowing connections that are part of business requirements.
Intrusion prevention is enabled in prevent mode to detect and block well-known vulnerabilities and attacks. The device connects to Check Point's cloud for updates on signatures to new threats.
We are peering with Partners via Site-to-Site VPNs for Services.
How has it helped my organization?
1. It's offering perimeter security to publicly accessible sites. There's better security at the edge and DMZ with the use of access policies.
2. The activation of Intrusion Prevention Blades offers better security at the perimeter and between DMZ Zones. IPs also have prebuilt security profiles making deployments of IPS fast and efficient, and exceptions to the rule base are easy.
3. The use of a remote access VPN is used to connect to partner sites.
4. Check Point offers virtualized systems, making it easy to scale. Instead of buying new equipment, we have set up virtual systems for the DC and user networks.
What is most valuable?
1. Intrusion prevention. Preventing and detecting well know vulnerabilities to our publicly accessible systems is easy. Inbuilt predefined security profiles can be deployed out of the box.
2. Virtualized security. Virtualized products are used to provide more scalability and ease of administration to the network.
3. Identity awareness. Granular policies on the firewall are based on identities.
4. Site-to-site VPN. We can make connections with partners securely.
5. Reporting. Prebuilt reports that are already in a well-presented manner could be presented to management.
6. Access Policy and NAT rules base.
What needs improvement?
1. Complexity in upgrades. Currently, upgrades are quite cumbersome. I would prefer the click of a button and process upgrades.
2. Pricing. The pricing is quite high as compared to other industry firewalls (such as Cisco or Fortinet).
3. Documentation. They have to improve on providing more documentation and examples for certain features online. In other sections, it feels shallow and we could use more information and examples.
4. Complexity in system tweaks. There are some knobs that need to be tweaked at the configuration files on the CLI which can be considered complex.
5. Check Point Virtual Security. The features take a bit more time to be released as compared to physical gateways.
For how long have I used the solution?
I've used the solution from 2017 until now.
What do I think about the stability of the solution?
A word of caution, especially on new software: you might hit a couple of bugs. Therefore, the general recommendation is to wait for a few takes before upgrading to a major version.
With older versions it's stable.
What do I think about the scalability of the solution?
The solution offers high-performance devices ranging from small to big data centers.
Virtual Security offers up to 13 connected gateways helping with managed security.
How are customer service and support?
First-line support is hit or miss, and at times getting an engineer to assist on the call can take hours.
Opening tickets on the Check Point platform is ok with the first response depending on the workload of the engineers.
This is one place Check Point needs to improve.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we were using Cisco ASA 5585. However, the performance was not reliable, and scaling would have been an issue.
We opted to go with Check Point, which could handle high performance and scaling was easier. Check Point also offered IPS features which were easier. Check Point also had better reporting and management tools.
How was the initial setup?
The initial setup was a bit complex since we were deploying virtual systems.
The interface configurations, access policy, VPNs, and NAT setup were easy. The complexity was in understanding how Check Point handles virtualized security instead of physical security gateways.
What about the implementation team?
The initial implementation was with the help of a vendor with good knowledge of the product.
What was our ROI?
It's used to protect the organization from security threats and provide connectivity to our applications which is the main platform for business. That's the ROI we've noted.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing for Check Point are high.
Which other solutions did I evaluate?
Due to experience with Check Point, we did not evaluate other options (like Fortigate or Palo Alto).
What other advice do I have?
Generally, Check Point is a good product with a lot of security features that I would recommend to any organization.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Great VSX, URL filtering, and DLP capabilities
Pros and Cons
- "HTTP forwarding is something I haven't seen elsewhere."
- "The web UI for VSX could be better."
What is our primary use case?
We are a top enterprise with a huge Check Point presence. We have been using Check Point since its older R65 version, and we are currently on the R81 version.
We have close to 200 Check Point devices for DC and all remote sites. We are also using Check Point for our edge security along with the Sandbox environment.
Check Point is also used as a VPN solution which is a pretty easy setup.
Check Point Cloud Guard is an excellent find we were able to do some cloud-based networking in our private cloud.
HTTP forwarding is one feature that I haven't seen in Check Point's competitors. With it, I can just send all HTTP traffic to a cloud-based proxy directly without building a GRE tunnel or VPN.
How has it helped my organization?
We took some major leaps with Check Point virtualization. VSX is one of the phenomenal features of Check Point. It allows us to virtualize multiple environments. We have saved hundreds of thousands of dollars with VSX.
Instead of using a number of small firewalls, we bought a couple of CP 23K series with 20 virtual licenses. It really worked for us with the MDS and smart log.
HTTP forwarding is something I haven't seen elsewhere.
What is most valuable?
VSX, URL filtering, and DLP are all excellent. VSX is the best thing we have used. We can use virtual switches and virtual routers for VLAN extensions. Another great feature is the "Active-Active" state that no other firewalls provide. I worked with other vendors as well; however, Check Point is the only one that can provide very good support on the Active-Active state. I still like the traditional way of troubleshooting using TCPDUMP and the FW monitor. Application IDs can be used, which is a significant improvement from previous versions.
What needs improvement?
The web UI for VSX could be better. As we enable VSX on physical gateways we cannot access the web UI. Smart log setup isn't so easy. We have some issues with some domains, however, overall, the smart log is a really good feature that helps navigate to the right domains for troubleshooting.
We have so many applications, including smart updates, provisioning, etc. I would like to see a single pane where I can do everything instead of going to each application and making changes.
More and more application IDs and integration is a really good thing and that's something I am looking for.
For how long have I used the solution?
I've used the solution for eight years.
Which solution did I use previously and why did I switch?
We used another solution before, which was only command-line based. Check Point was only the major competitor and best option a decade ago.
What's my experience with pricing, setup cost, and licensing?
We need to choose technology first, and obviously, others follow. Check Point's three-tier architecture is the main reason for us using it. I believe the pricing is pretty competitive.
Which other solutions did I evaluate?
We did look at other options, including Fortinet, however, nothing is as good as Checkpoint.
What other advice do I have?
Check Point is a good solution. It is a reliable solution above all.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
Buyer's Guide
Download our free Check Point Quantum Force (NGFW) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?