Try our new research platform with insights from 80,000+ expert users
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at a tech services company with 51-200 employees
Real User
Top 20
Nov 3, 2022
Good URL filtering, good blocking, and helps with compliance
Pros and Cons
  • "The most valuable feature that I see in the application is the filtering of the URLs."
  • "I would like to be able to see an integration with centralized management services."

What is our primary use case?

We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.

How has it helped my organization?

This solution gives us protection mainly for users and applications. It allows us to apply compliance policies and regulations based on the role of the corporation's business. We can protect ourselves from high-risk malicious applications on websites. We can block these sites by preventing malware infection. The detection of infected devices with a layered architecture where several layers provide our remote workers with a security policy. Everything is being analyzed and safeguarded and made available to users no matter where they are. We get security and can filter the content, which is something that is needed in order to be well protected.

What is most valuable?

The most valuable feature that I see in the application is the filtering of the URLs. We can see the width of the transmission content and access the data. The filtering with a control solution allows us to manage each one of the layers of the policies and generate a granularity-based assessment of users. We can block or eliminate the use of the application or its characteristics. This allows us to share between private and secure applications within our organization and cover each of the user identities.

What needs improvement?

I would like to be able to see an integration with centralized management services. When I say centralized, I mean maybe even R80 management. I'd like one appliance for centralized management that could handle other features. I don't know if doing this is part of the business strategy of Check Point, however, maybe we could see it in the future.

Buyer's Guide
Check Point Web Gateway
January 2026
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at a security firm with 5,001-10,000 employees
Real User
Top 20
Oct 13, 2022
Great for limiting, blocking, or allowing access to sites
Pros and Cons
  • "It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it."
  • "We would really benefit from some more visual features that can help view the impact of the security gateway in the organization."

What is our primary use case?

The Check Point Web Gateway is a great security asset, providing the website and application control our organization needs. You can set customized access policies to filter network traffic, restricting or even blocking access to both websites and applications when necessary. 

It operates as a firewall and protects our cloud environment as an additional layer to the infrastructure. It is cloud-based, which makes its deployment very simple and easy to manage and maintain. The solution is efficient overall.

How has it helped my organization?

The solution helps us with some of the most important and basic preventive actions we can take, like blocking malicious websites and applications from being accessed by our company's users and also protecting our applications from being targeted. 

It filters the URLs by reputation, denying access to those proven to be harmful and inspecting those which haven't been flagged yet to detect threats before the user can enter it. 

When it comes to streaming, it will regulate the bandwidth it consumes and will alert when its consumption goes over the established limit.

What is most valuable?

We grant different levels of accessibility to users based on their role within the company, so we may limit, block, or allow their access to sites and download data or applications depending on what's been established by the organization. Its intuitive algorithm will pick up certain users' uncommon behavior and notify our IT administrators of irregular activity that could go against the company's best interest in terms of both security and productivity, giving ground to customize our security ruleset when needed.

What needs improvement?

We would really benefit from some more visual features that can help view the impact of the security gateway in the organization. 

It'd be useful if we could use charts and graphics directly pulled from the console to emphasize our point or the need for policy adjustments or the elimination of redundant rulesets. 

I'm sure even from an operational standpoint, we could use it to track better how our day-to-day actions directly affect the company security reinforcement, where we're lacking, and what needs to continue to be done.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Web Gateway
January 2026
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Antonio Palhinhas - PeerSpot reviewer
Deputy Director of Information and CommuniDeputy Director of Information and Communication Systems at a media company with 201-500 employees
Real User
Jul 18, 2022
Useful content filtering, reliable, and web options
Pros and Cons
  • "The most valuable features of Check Point Web Gateway are all the IPS. However, what matters for users is content and web filtering."
  • "Check Point Web Gateway could improve the user interface. It could be made more modern."

What is our primary use case?

Our primary use for Check Point Web Gateway is network security.

How has it helped my organization?

Being a media company the use of Internet is part of company's business, therefore it is very important to be able to protect both company assets and users. Check Point gateways provided an important role on that security measures.

What is most valuable?

One of the most valuable features of Check Point Web Gateway is the IPS capability. However, what matters most for users security is content and web filtering.

What needs improvement?

Check Point Web Gateway could improve the graphical user interface to make it more appealing. However it works.

For how long have I used the solution?

We have been using Check Point Web Gateway for approximately 10 years.

What do I think about the stability of the solution?

Check Point Web Gateway is a reliable and stable solution.

How are customer service and support?

Personally I do not have experience with the support of Check Point Web Gateway, but the team is happy with it. If there is no solution on their website the phone support usually works fine.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of Check Point Web Gateway was straightforward.

What about the implementation team?

We used the support for the deployment of Check Point Web Gateway.

We have a team of two people for the maintenance of the solution.

What other advice do I have?

My advice to others is for them to make sure they have the right model of Check Point Web Gateway they need for their business. The most inexpensive version might not have have the performance needed.

I rate the price of Check Point Web Gateway an eight out of ten.

There are some other solutions in the market with a bit better performance.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT Security Analyst at a financial services firm with 1,001-5,000 employees
Real User
Oct 20, 2023
A scalable and intuitive solution that is easy to deploy and maintain
Pros and Cons
  • "SmartConsole is intuitive."
  • "The support must be faster."

What is most valuable?

The product is good in general. SmartConsole is intuitive.

What needs improvement?

We have problems configuring Check Point Remote Access VPN. The clients are connected to Remote Access VPN by IP assignment. The issue is very hard to resolve because we authenticate in Check Point.

For how long have I used the solution?

I have been using the solution for six months.

What do I think about the stability of the solution?

The tool is stable. I rate the stability a seven or an eight out of ten.

What do I think about the scalability of the solution?

The tool is scalable. Three people in my organization are using the product.

How are customer service and support?

The technical support is moderately good. The support must be faster. The responses are not very quick.

How would you rate customer service and support?

Neutral

How was the initial setup?

The installation is easy. It took us one day to deploy the product because it was necessary to know the configurations. It is easy to maintain and upgrade the solution. The updates can be done in five hours.

What about the implementation team?

I installed the tool with the help of a specialist.

What's my experience with pricing, setup cost, and licensing?

We pay a yearly licensing fee for the solution.

What other advice do I have?

I recommend the product to others because it is one of the best solutions. Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ikechukwu Okonkwo - PeerSpot reviewer
Head, Network Security at a financial services firm with 1,001-5,000 employees
Real User
Aug 13, 2022
It provides top-notch security but is not very user-friendly
Pros and Cons
  • "It has an excellent threat prevention mechanism."
  • "It is not user-friendly."

What is our primary use case?

It helps in establishing a site-to-site VPN with our on-premise firewall. We also use it to protect our cloud environment and layering protection for our cloud data centre.

How has it helped my organization?

This product has improved our organization by serving as a connection point with our partners. In addition, it provides top-notch security and gives us the confidence that we have a secure connection when dealing with our partners.

What is most valuable?

The encryption detection feature and the revision systems are valuable. Additionally, it has an excellent threat prevention mechanism.

What needs improvement?

The product could be improved in terms of its complexity. The product requires prior knowledge and information and would be difficult for an engineer with minimal experience to understand.

For how long have I used the solution?

We have used this solution on premises for approximately seven years and on the cloud for a year.

What do I think about the stability of the solution?

Due to its complexity, I rate its stability a six out of ten. We regularly have to update our hardware with the latest hotfixes to avoid bugs in the system. Additionally, the system has to be updated often to ensure there are no bugs.

What do I think about the scalability of the solution?

The solution is highly scalable. We intend to continually increase our usage of this solution due to its interoperability.

How are customer service and support?

We have not had the best experience with customer service and support, mainly because of the support tier structure. In our experience, our issues are not frequently solved until they are escalated to senior-level engineers, which leads to wasted time as we are often unable to access the experienced engineers until a case has escalated.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup varies depending on whether it is on-premises or on cloud. For cloud, I rate the initial setup a six out of ten. For on-premises, I rate it an eight out of ten. Sometimes, the setup is complex and lasts as long as nine hours.

What about the implementation team?

We implemented it through a third party. Three people who were network security engineers and firewall engineers participated in the deployment.

What's my experience with pricing, setup cost, and licensing?

I don't know the specific licensing prices, but it is based on the deployment size and is relatively more expensive than other products. Once licensing and support costs are paid, there are no additional costs.

Which other solutions did I evaluate?

We evaluated Azure Firewall.

What other advice do I have?

I rate this solution a seven out of ten. The solution is highly interoperable and is of good quality, but it could be improved in terms of its complexity, as it is not user-friendly. Additionally, the support levels could be improved.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Eric Liao - PeerSpot reviewer
Solution Manager at a tech services company with 201-500 employees
MSP
Top 5
Jun 7, 2022
Has valuable customer-facing features, like malware
Pros and Cons
  • "I think this solution is very helpful to our customers because its cloud-based security can be deployed quickly and maintained easily."
  • "Check Point Web Gateway could add an end point access function."

What is our primary use case?

Many of our clients use Check Point Web Gateway as a cloud base, firewall, and DPI for their security assets. All of this is deployed on the cloud. Because we are the service provider, we can use the SDN technology to connect to our customer and take the traffic to the Check Point cloud.

What is most valuable?

The Check Point Web Gateway features I find the most valuable are the customer-facing ones, like the malware and internet tech. I think this solution is very helpful to our customers because its cloud-based security can be deployed quickly and maintained easily. Check Point Web Gateway also comes with a particular sharing model, as it's deployed on the cloud on a monthly renting model. This is very different from the legacy price. 

What needs improvement?

I have not come across anything that would need to be improved as I have only worked with Check Point Web Gateway for about two years. 

Check Point Web Gateway could add an end point access function. Their competitors can deploy all data via AG Subway on mobile devices, giving customers access from the endpoint. This option has been available for some four years now at Check Point Web Gateway's competitors. 

For how long have I used the solution?

I have been using this solution for nearly two years now.

What do I think about the stability of the solution?

I think Check Point Web Gateway is stable.

What do I think about the scalability of the solution?

Check Point Web Gateway is more scalable than legacy solutions, but all of this depends on a company's scaling requirements. 

How are customer service and support?

Check Point Web Gateway's tech support answers tickets very quickly.

How would you rate customer service and support?

Positive

How was the initial setup?

Whether the initial setup is easy will depend on the cloud space - public, private, or hybrid, that you will use for the deployment. This will depend on the customer's requirements. 

What about the implementation team?

We actually provide deployment services. 

The number of engineers that we dispatch for a specific deployment will depend on the customer. The most basic deployment will require two engineers. Overall, deployment will take two days. 

What was our ROI?

I can't really say too much about the ROI we've had from Check Point Web Gateway because I am responsible for the tech support.

What's my experience with pricing, setup cost, and licensing?

Setup costs, pricing, and licensing is different in each country. We provide licensing for Taiwan. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at a tech company with 10,001+ employees
Real User
Top 20
Jan 3, 2021
URL filtering and application control help us to secure against malicious websites and applications
Pros and Cons
  • "Application control allows the administrator to create granular policies based on users to allow, block, or limit access."
  • "Most of the time, we are struggling when it comes to getting support."

What is our primary use case?

We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites.

With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.

How has it helped my organization?

Check Point Web Gateway has improved our inbound and outbound traffic for applications or websites and related queries with features such as URL Filtering. It can control access to websites based on URLs to prevent employees from accessing malicious or inappropriate content and also we enforce bandwidth on streaming services.

These are very good features for us.

We can also now easily identify which users are accessing which URLs, and we can control access based upon them.

Application control allows the administrator to create granular policies based on users to allow, block, or limit access.

What is most valuable?

With Check Point Web Gateway, we have found the following features the most valuable:

  1. URL Filtering
  2. Application Control
  3. Antivirus

URL filtering allows us to control websites based on URL contents and whether any inappropriate content or any malicious content is there.

It allows us to enforce bandwidth restrictions on a specific destination or URL, where some streaming service content is available.

URL filtering management is based on the URL, users, and groups, where access can be either granted or denied.

What needs improvement?

Most of the time, we are struggling when it comes to getting support. Due to this, we have now have taken TAM support and have also taken third-party support for this product. Generally, the support experience is not what we expect from Check Point.  

For how long have I used the solution?

We have been using this solution for more than one year.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point is a very good solution, although the price and other licensing costs are something that you have to check.

What other advice do I have?

In summary, Check Point Web Security is a very good solution for us. We have been using it for a long time and we use all of the aspects. For security concerns, Check Point Web Security is the best solution with features such as URL filtering, application control, and antivirus.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Director at a tech services company with 51-200 employees
Real User
Mar 5, 2021
Very stable, extremely scalable, and easy to install, but it is expensive
Pros and Cons
  • "It is very stable."
  • "It is expensive. Its price should be better."

What is our primary use case?

It is primarily used for highlighting the threats that are coming from various locations. We are using its latest version.

What is most valuable?

It is very stable.

What needs improvement?

It is expensive. Its price should be better.

For how long have I used the solution?

I have been using this solution for the last seven to eight years.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

It is extremely scalable. We have close to 3,000 users who are using it.

How are customer service and technical support?

We have required technical support quite a few times, and it has been very forthcoming from Check Point. I am satisfied with their support.

Which solution did I use previously and why did I switch?

We didn't use any other solution.

How was the initial setup?

It was easy to install. It took close to a week to fully deploy it, make it operational, and manage it.

What about the implementation team?

We are an integrator of this solution. There are two engineers who are managing it.

What's my experience with pricing, setup cost, and licensing?

It is expensive. Licensing is on a yearly basis. You need to do the support subscription.

What other advice do I have?

I would definitely recommend this solution. I would rate Check Point Web Gateway a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Product Categories
Secure Web Gateways (SWG)
Buyer's Guide
Download our free Check Point Web Gateway Report and get advice and tips from experienced pros sharing their opinions.