No more typing reviews! Try our Samantha, our new voice AI agent.
Charity Kimotho - PeerSpot reviewer
Information Technology Technician at Smoothtel & Data Solutions Ltd
Real User
Feb 23, 2024
Useful for observing traffic flow from one gateway to another
Pros and Cons
  • "The product's best feature is observing how the traffic flows from one gateway to another. It's convenient for checking specific details, and you can manage everything centrally."
  • "I would like to see improvement in the tool's availability."

What is our primary use case?

I use the solution to check and control the traffic. 

What is most valuable?

The product's best feature is observing how the traffic flows from one gateway to another. It's convenient for checking specific details, and you can manage everything centrally.

What needs improvement?

I would like to see improvement in the tool's availability.

For how long have I used the solution?

I have been using the product for the last three years. 

Buyer's Guide
Check Point Web Gateway
May 2026
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,164 professionals have used our research since 2012.

What do I think about the stability of the solution?

The product is stable. 

How are customer service and support?

I faced an issue where my Check Point Web Gateway couldn't update the firmware. I reached out to the support team through the call center, explained the problem, and they provided me with the firmware image. I installed it using a flash drive, and the issue was resolved.

Support is available 24/7. You can log in to your partner portal open a case with details of your issue and provide the serial number for the device. Communication is flexible; you can start with live chat, progress to email, and receive continuous updates. If you prefer, they even offer one-on-one calls to discuss and resolve issues.

How was the initial setup?

The tool's deployment is not difficult; the difficulty arises if you're unfamiliar. Navigating can be tricky if you haven't worked with Check Point Web Gateway. Understanding where to find and review settings, especially regarding IPs, might pose some challenges initially.

What's my experience with pricing, setup cost, and licensing?

The product is not cheap. It is expensive. 

What other advice do I have?

The tool is not easily hackable. The information is kept hidden, making it challenging for someone unfamiliar to navigate and access it. This high level of security, around 86 percent, makes it safe and reliable. With SMS, you can efficiently manage multiple gateways. Unlike individual gateways, where you must navigate policies separately, SMS allows you to push policies to other gateways. It eliminates the need to work on each gateway individually. I rate the product a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
AnkurSharma3 - PeerSpot reviewer
Cyber SOC Manager at Tower Research Capital
Real User
Top 5
Dec 10, 2023
A cloud solution to filter internet traffic with average pricing

What is our primary use case?

Check Point is a very closed technology that filters internet traffic.

What is most valuable?

The most valuable feature is the granularity of the security policy. We can select one application, and in that application, we can control all the components of that application. It provides in-depth control of any application. For example, Facebook is one application. You can do it if you want to block the Facebook chat and use the Facebook application. Facebook will work, but you won't be able to open the Facebook chat window.

What needs improvement?

Check Point can introduce Honeypot. A honeypot is a dummy server inside the network to identify the numeric attack pattern.

For how long have I used the solution?

I have been using Check Point Web Gateway for three years.

What do I think about the scalability of the solution?

The solution was very much scalable.

How are customer service and support?

The support is good.

Which solution did I use previously and why did I switch?

We have used Forcepoint. We moved from the Forcepoint because it cannot control the traffic at the granular level we were looking for. Facebook should be on, but the chat or file uploading should be blocked. At the same time, Check Point provides in-depth control and advanced functionality compared to Forcepoint.

How was the initial setup?

The initial setup is easy and takes around two months to complete.

What's my experience with pricing, setup cost, and licensing?

The solution has average pricing. It's worth the money.

What other advice do I have?

Overall, I rate the solution a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Web Gateway
May 2026
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,164 professionals have used our research since 2012.
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Jun 23, 2025
Flexible with good web filtering and overall robust security
Pros and Cons
  • "The stability of the tool is very good."
  • "Perhaps the latency in the administrative part of the portal would be a point of improvement."

What is our primary use case?

Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure. 

Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network. 

Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.

How has it helped my organization?

When this tool was implemented, it gave us a lot of flexibility and confidence in the organization. The characteristics, such as web filtering and security in URL applications are great. With them, we have great visibility of vulnerabilities that surround us. With analysis, it was possible to attack all the points where the company had security weaknesses and strengthen those points. It also presents a large part of very granular reports or statistics.

What is most valuable?

The Check Point Web Gateway tool presents several valuable features such as URL filtering, application, and antivirus control. These characteristics are very valuable since they are customer-oriented. 

It provides very efficient security and can also be implemented in the cloud, which is very good. In recent years the cloud has gained a lot of strength and is very valuable in terms of IPS capacity.

What needs improvement?

At the moment, we have not found any point of improvement in the last three years. The tool has behaved very well both in scalability and stability. 

Perhaps the latency in the administrative part of the portal would be a point of improvement. 

The technical support of Check Point, in general, has had problems in providing effective, reliable, and timely support. On many occasions, we have had problems and it did not help us in a reasonable amount of time.

That said, in general, the tool provides the respective functionality for which it was created and protects the organization very well.

For how long have I used the solution?

We implemented the solution 4 years ago..

What do I think about the stability of the solution?

The stability of the tool is very good. They always stay on top of everything. There have been very few times we have seen problems.

What do I think about the scalability of the solution?

It has very good scalability and is very fast.

How are customer service and support?

The experience with technical support has not been very good. We always have problems with a quick response.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously no tool had been implemented.

How was the initial setup?

The configuration was very simple the tool is easy to install.

What about the implementation team?

The tool was implemented with the IT department and an engineer provided by the vendor with a lot of experience.

What was our ROI?

We've seen an ROI in terms of the security implementation. The price is also important. You have to look for a good tool that 100% meets what you are looking for.

What's my experience with pricing, setup cost, and licensing?

The installation is very easy and user-friendly, and fast. The cost is competitive in the market.

Which other solutions did I evaluate?

Other options were not evaluated since we have handled some Check Point tools previously, and we liked the characteristics of this one.

What other advice do I have?

It is a reliable and safe tool.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Feb 26, 2023
Improves efficiency and lowers bandwidth costs but needs more scalability
Pros and Cons
  • "One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network."
  • "The solution should improve integration."

What is our primary use case?

Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes. 

Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.

How has it helped my organization?

It has given us the ability to optimize advanced caching and comprehension techniques to improve web performance and reduce the bandwidth used by online applications. This allows our company to improve the efficiency of its network infrastructure and reduces bandwidth costs, thus achieving outstanding performance in the generation of reports and analysis. Now, we can better understand the use of the web and the threats we face every day. The solution allows for general organization reports, offering us data and information in a personalized way. 

What is most valuable?

One of its rather outstanding capabilities is its ability to add an extra layer of protection to our company's internal network. This allows us to filter and analyze all network traffic, including web traffic, and to effectively detect and block any web or malware threats that may be trying to infiltrate the network. 

In addition to providing us with threat protection, we can also make use of tools to control the bandwidth and limit of users to websites and online applications. This helps us prevent users from accessing malicious websites or any site that is not authorized. 

What needs improvement?

The solution should improve integration. Today, its scalability is one of its few characteristics that must be improved. We may need to consider an alternative solution due to its complexity. We need more elasticity to make it more scalable, dynamic, and efficient. It is important to note that many of its analytics features are among the best, yet it still needs improvements and updates that are faster and more efficient under control directives and policies. We would like an easy deployment and a solution that can scale vertically or horizontally. 

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Feb 20, 2023
Used in Cloud, excellent option, modern and safe
Pros and Cons
  • "The implementation of this tool was straightforward."
  • "Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support."

What is our primary use case?

Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need. 

Then we were allowed to try this type of tool and see the results.      

Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.

How has it helped my organization?

The Check Point Web Gateway tool has helped us improve the security of the equipment and access that we previously had. Generally, a lot of malware was installed on the equipment, which without the user realizing it affected both the performance and the exposure of the information that they had access. After the implementation of Check Point, these threats disappeared little by little, improving through granular policies in which through user profiles we were attacking to solve them. It's been an excellent tool for us.

What is most valuable?

The features of Check Point Web Gateway that we liked the most are the following:

1- Monitoring. The monitoring provided by Check Point security technologies is very good, easy to understand, and helps in an excellent way to verify the behavior of the tool.

2- Granular Policies. Through granular policies, we were able to create different profiles that depended on the type of user. In some cases, it is more restrictive for normal users than for managerial users, that is, always mainly providing security. However, different restrictions helped us a lot. We could establish them without generating annoyance for the client depending on their role in the company.

3- Easy implementation. 

What needs improvement?

The aspects that we have evaluated over time to give an opinion on an improvement that the Check Point security manufacturer can generate are the following:

1- Improvement of technical support. It is important that Check Point can generate greater growth at the support level. Errors are not always easily solved.

2- Updated Documentation. Some documents needed to implement with the best practices are difficult to understand, take longer than expected to apply, and sometimes even require support.

3- The costs. Some Check Point features are somewhat expensive.

For how long have I used the solution?

A very good idea to use a web gateway since it generates greater security in the access of our collaborators to the use of the internet and applications,

The use has been successful for at least two years. Initially, the implementation was carried out partially to see the adaptation of the service, which was widely adopted by users understanding the threats that currently exist.

Which solution did I use previously and why did I switch?

Previously, we had validated options and used open-source tools. However, they were most difficult to manage and use.

What's my experience with pricing, setup cost, and licensing?

I always recommend that, before implementing, a customer discusses the business needs with the vendor in order to choose the ideal product.

Also, implement small tests to test the operation before going to production.

Which other solutions did I evaluate?

We needed to be able to quickly implement a tool that would meet the security needs. We already used Check Point products. It has gone very well for us, which is why we opted for the use of this application without hesitation.

What other advice do I have?

I recommend the use of this tool. However, take your time and validate if it suits your needs completely.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Nov 21, 2022
Prevents prevent data loss has good content filtering and offers good security
Pros and Cons
  • "It offers good security and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility."
  • "The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers."
  • "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."
  • "We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment."

What is our primary use case?

We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access. 

How has it helped my organization?

The Check Point solution has given us many benefits and among those is being able to prevent data loss through browsers. The evolution of technological attacks or hacks has become very innovative and sophisticated, which can make any organization vulnerable. However, we have come to feel safe implementing this type of solution as it has given us the protection that each one of us was looking for.

What is most valuable?

The Check Point Security Web Gateway service has the most beneficial features available for anyone. Among many of the things that we can highlight is the content filtering application control. Checking for antiviruses is enabled through the inspection solution. It offers good security, and we use it when we want to implement the best security in an organization due to the fact that it gives us broader visibility.

What needs improvement?

The solution is quite complete and is very prominent. It is designed to be implemented for web services. We understand that if we want to see greater connections, greater services, and a greater capacity established for primary equipment, this solution needs to evolve to make an application installed directly on equipment. If they could do this and provide the same connectivity, security, and efficiency that it has today for edge equipment, that would be ideal. If we could bring this service to mobile applications and applications directly installed on the device, we could expand and create a neural security network for all the devices we have.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 20
Nov 3, 2022
Good URL filtering, good blocking, and helps with compliance
Pros and Cons
  • "The most valuable feature that I see in the application is the filtering of the URLs."
  • "This solution gives us protection mainly for users and applications."
  • "I would like to be able to see an integration with centralized management services."
  • "I would like to be able to see an integration with centralized management services."

What is our primary use case?

We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.

How has it helped my organization?

This solution gives us protection mainly for users and applications. It allows us to apply compliance policies and regulations based on the role of the corporation's business. We can protect ourselves from high-risk malicious applications on websites. We can block these sites by preventing malware infection. The detection of infected devices with a layered architecture where several layers provide our remote workers with a security policy. Everything is being analyzed and safeguarded and made available to users no matter where they are. We get security and can filter the content, which is something that is needed in order to be well protected.

What is most valuable?

The most valuable feature that I see in the application is the filtering of the URLs. We can see the width of the transmission content and access the data. The filtering with a control solution allows us to manage each one of the layers of the policies and generate a granularity-based assessment of users. We can block or eliminate the use of the application or its characteristics. This allows us to share between private and secure applications within our organization and cover each of the user identities.

What needs improvement?

I would like to be able to see an integration with centralized management services. When I say centralized, I mean maybe even R80 management. I'd like one appliance for centralized management that could handle other features. I don't know if doing this is part of the business strategy of Check Point, however, maybe we could see it in the future.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Top 20
Oct 13, 2022
Great for limiting, blocking, or allowing access to sites
Pros and Cons
  • "It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it."
  • "The Check Point Web Gateway is a great security asset, providing the website and application control our organization needs."
  • "We would really benefit from some more visual features that can help view the impact of the security gateway in the organization."
  • "We would really benefit from some more visual features that can help view the impact of the security gateway in the organization."

What is our primary use case?

The Check Point Web Gateway is a great security asset, providing the website and application control our organization needs. You can set customized access policies to filter network traffic, restricting or even blocking access to both websites and applications when necessary. 

It operates as a firewall and protects our cloud environment as an additional layer to the infrastructure. It is cloud-based, which makes its deployment very simple and easy to manage and maintain. The solution is efficient overall.

How has it helped my organization?

The solution helps us with some of the most important and basic preventive actions we can take, like blocking malicious websites and applications from being accessed by our company's users and also protecting our applications from being targeted. 

It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it. 

When it comes to streaming, it will regulate the bandwidth it consumes and will alert when its consumption goes over the established limit.

What is most valuable?

We grant different levels of accessibility to users based on their role within the company, so we may limit, block, or allow their access to sites and download data or applications depending on what's been established by the organization. Its intuitive algorithm will pick up certain users' uncommon behavior and notify our IT administrators of irregular activity that could go against the company's best interest in terms of both security and productivity, giving ground to customize our security ruleset when needed.

What needs improvement?

We would really benefit from some more visual features that can help view the impact of the security gateway in the organization. 

It'd be useful if we could use charts and graphics directly pulled from the console to emphasize our point or the need for policy adjustments or the elimination of redundant rulesets. 

I'm sure even from an operational standpoint, we could use it to track better how our day-to-day actions directly affect the company security reinforcement, where we're lacking, and what needs to continue to be done.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Product Categories
Secure Web Gateways (SWG)
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros sharing their opinions.