I use Check Point Quantum Force (NGFW) mainly as a next-generation firewall to secure network traffic, most often for threat prevention, IPS, and managing segmentation across different environments. In my case, I often use Check Point Quantum Force (NGFW) to segment sensitive servers from the rest of the network and enforce stricter IPS profiles on that zone. For example, if I notice unusual traffic hitting a critical server, Check Point Quantum Force (NGFW) usually flags it and blocks it.
In my organization, the main use case for Check Point Quantum Force (NGFW) is to connect our private network to the public network, and we have two ISP links connected to our firewall. We have NATed our private IP to these two ISP links. Whatever traffic needed to flow to the internet goes to these two ISPs, with all the NATing, user control, and security configured in Check Point Quantum Force (NGFW). This is what every organization needs right now because to provide a first layer of defense, connectivity to the internet, and user control, we can achieve all of this through any Next Generation Firewall, and Check Point Quantum Force (NGFW) is among those providers, being very reputed and providing a good solution with stability.
Server Security Analyst and Solution at Digitaltrack Solutions Pvt Ltd
Real User
Top 5
Nov 7, 2025
My main use case for Check Point Quantum Force (NGFW) is to provide internet reachability to our private network to the public network, and that is basically a primary use case. The secondary use case is to provide a remote access VPN, which is a feature of that firewall. Additionally, we are using branch connectivity with the help of Check Point Quantum Force (NGFW). We are using Check Point Quantum Force (NGFW) as a first layer of security defense, so these are four major use cases we are using right now. I can give you a specific example of how I use Check Point Quantum Force (NGFW) for internet reachability or remote access VPN in my daily work. Every day, more than hundreds of employees come to our office and connect their laptops and desktops. All these private IPs are able to browse anything on the internet securely with the help of Check Point Quantum Force (NGFW). Even if they require any communication from the branch office, they are connected through the IPsec tunnel, which is a feature of this firewall, so they are able to reach the other side private network as well.
Network Engineer at a tech services company with 51-200 employees
Real User
Top 5
Oct 25, 2025
My main use case for Check Point Quantum Force (NGFW) is advanced threat prevention and IPS. A specific example of how I use Check Point Quantum Force (NGFW) for advanced threat prevention and IPS in my daily work is utilizing cloud native and API friendly deployment architecture, ensuring availability of recognition and ease of management. I protect public facing web applications, API security, and bot and DDoS attack protection as part of my daily use case with Check Point Quantum Force (NGFW).
My main use case for Check Point Quantum Force (NGFW) is to provide connectivity from our private LAN network to the WAN side, and for internet reachability. A specific example of how Check Point Quantum Force (NGFW) helps with our private LAN networks is that in our private network, there is no reachability to the internet without any security or next-generation firewall. We have deployed this solution and our private network got NATted in the device, establishing connection to the internet. We are also using Check Point Quantum Force (NGFW) for security purposes and user control.
Inside Sales Manager at Digitaltrack Solutions Pvt Ltd
Real User
Top 5
Oct 24, 2025
All the internet traffic from LAN to WAN passes through Check Point Quantum Force (NGFW), so all the inspection, threat inspection, app control, user control, and threat prevention configurations are implemented in Check Point Quantum Force (NGFW). With the help of Check Point Quantum Force (NGFW), we are able to access the internet in a secure manner, and the private IPs are NATed in this device.
Learn what your peers think about Check Point Quantum Force (NGFW). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
network and security engineer at Max international
Real User
Top 5
Oct 24, 2025
I'm using Check Point Quantum Force (NGFW) as our internet gateways and I use it as SSL decryption as well as URL filtering. In my organization, I use Check Point Quantum Force (NGFW) to limit all applications that are not required for our organizations. For example, when YouTube or Facebook needs to be blocked via application, YouTube cannot be blocked directly. We need to do SSL decryption so that the firewall can see all packets, inspect them, and block necessary applications and URLs.
Technical Specialist at VDA Infosolutions Pvt. Ltd.
Real User
Top 5
Oct 24, 2025
Our main use case for Check Point Quantum Force (NGFW) is to provide internet connectivity to our private network users, and we are using a device for internet connectivity, other branches connectivity, and SSL remote access VPN users. We have branch to branch connectivity to our headquarters using Check Point Quantum Force (NGFW), so our branch users access private resources and servers from the local private network with the help of IPsec VPN.
Our main use case for Check Point Quantum Force (NGFW) is as a security gateway in our network, isolating our private network from the WAN side with the help of Check Point Quantum Force (NGFW), and we rely on it for features such as VPN, application control, URL filtering, sandboxing, and IPS. Instead of taking multiple devices for VPNs, application control, or sandboxing, Check Point Quantum Force (NGFW) provides all these features with a software blade architecture in the box. We have taken the license for VPN, application control, URL filtering, IPS, sandboxing, and antivirus to prevent outside threats efficiently and secure our private network and resources. We are using Check Point Quantum Force (NGFW) to connect our other branches, as we have multiple branches in different Indian states connected through an IPsec tunnel, which is a feature of Check Point Quantum Force (NGFW).
My main use case for Check Point Quantum Force (NGFW) is to use it as a security gateway where we have configured SSL VPN, IPsec VPN and configured firewall for network security. I am using Check Point Quantum Force (NGFW) to provide our employees remote access VPN, as well as security while accessing any website to secure them from cyber threats. All use cases for Check Point Quantum Force (NGFW) are covered.
My main use case for Check Point Quantum Force (NGFW) is segmentation of VLANs, and the logging feature is great for my day-to-day operations. A specific example of how I use segmentation and logging in my environment involves segmenting equipment into different VLANs, terminating all the VLANs on the Check Point firewall, and using the logging features to debug what's happening if there are any issues.
In our customer environment, Check Point Quantum Force (NGFW) is used for edge security and internal security, both for data center and edge side. We don't have Check Point Quantum Force (NGFW) personally. We install it for our customers and then take care of it.
My main use case for Check Point NGFW is using it as our data center firewall, which basically keeps the resources behind the data center safe from all the different cybersecurity threats. Check Point NGFW has made a difference for our data center, especially when some people at some point tried to spoof their IPs within the organization, and upon checking the logs, we found a couple of IPs that had been blocked because they were trying to get in from a different network where we don't expect those IPs, so the traffic was denied because of the IP spoofing setup.
Technical Support Executive at Softcell Technologies Limited
Real User
Top 5
Jun 14, 2025
My main use case for Check Point NGFW is that it was deployed at the network edge to protect and manage incoming and outgoing traffic from the corporate network, which is controlled by Check Point firewall. We have implemented application control, URL filtering, content filtering, and similar features. This enables us to manage the traffic by creating granular policies, IP space, or user-based policies. The main use case is to control the inward traffic and stop cyber threats at the network edge only.
Pre-Sales Engineer (Network & Security) at a tech services company with 201-500 employees
Real User
Top 20
May 22, 2025
We primarily use Azure DevOps for source control with Git, CI/CD pipelines, and project management using Azure Boards, and it's pretty much the core of our development workflow.
Senior Security Analyst at SecurView Systems Pvt Ltd
Real User
Top 5
May 19, 2025
The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.
Technical Support Executive at a computer software company with 501-1,000 employees
Real User
Top 5
May 12, 2025
The main use case for Check Point NGFW is providing perimeter security, as the Check Point firewall is deployed at the edge to control all incoming and outgoing north-south traffic, used as a combination of features including URL filtering, application control, IPS, content awareness, identity provider, IPsec tunnel, and SSL VPNs, and was specifically deployed in one of the head office locations as a perimeter firewall to control all in-out traffic.
Ot Security Network Specialist at a pharma/biotech company with 10,001+ employees
Real User
Top 20
May 4, 2025
We use Check Point NGFW ( /products/check-point-ngfw-reviews ) for separating the IT networks from the OT networks. It provides advanced threat prevention, access control, IP policy, zoning, virtual interfaces, and NAT capabilities. While it also provides VPN, we are currently not using it but are exploring the option.
The checkpoint firewall is used as perimeter security for HO Location of the organisation. It is deployed at edge to use it as next gen firewall including features like, Antivirus, IPS, Application control, URL Filtering etc. Check Point Firewall offers strong NGFW (Next-Generation Firewall) features with smart security blades like IPS, Application Control, URL Filtering, Antivirus, Anti-Bot, Threat Emulation, and more—all in one device. It’s easy to integrate with other systems like Active Directory, SIEMs, and cloud platforms. I like how well it scales—whether it's a small office or a big enterprise, it works smoothly. The SmartConsole gives one place to manage everything. Tech support is knowledgeable and helpful, especially if you have a support plan. What makes Check Point unique is its ThreatCloud intelligence and the ability to create very detailed, identity-based rules. It also lets you handle complex networks with great control and visibility. Overall, it’s secure, flexible, and built for professionals who want full control over their network. If you know checkpoint product well its easy to use and implement
Senior Cyber Security Engineer at a computer software company with 501-1,000 employees
Real User
Top 5
Apr 30, 2025
We were looking for a solution to simplify our hybrid cloud infrastructure. We wanted something that could manage both our on-premises and cloud environments seamlessly. Nutanix offered that unified management plane. We also needed to improve our disaster recovery capabilities.
We use Check Point NGFW ( /products/check-point-ngfw-reviews ) for edge firewalls as well as internal segregation firewalls. It easily allows us to separate critical traffic from non-critical office traffic.
We use Check Point NGFW for enterprise firewalling, VPN, data loss prevention (DLP), user authentication, and zero-trust connectivity. All the functions of Check Point NGFW are utilized.
We are working with Check Point NGFW ( /products/check-point-ngfw-reviews ) as an internet firewall, a data center firewall, and a core firewall. We also deal with customers using the Maestro firewall for data centers.
President of the Advisory Board at a computer software company with 201-500 employees
Reseller
Top 10
Oct 3, 2024
We are using the solution for the perimeter. It's used as a core firewall, with almost all transactions passing through the firewall. For instance, in a cellular phone company, all transactional authorizations pass through the firewall, while in a bank, authorizations for branches and ATMs go through the firewall. The main customers are in the BFSI, telcos, industry manufacturing, and other large enterprise sectors.
Student at a university with 5,001-10,000 employees
Real User
Top 5
Sep 6, 2024
We needed stateful inspection, logging, integration with Active Directory, and the ability to monitor devices using standard SNMP for use cases. Now, with the tool's Skyline product and OpenTelemetry, we can monitor it through Prometheus and Grafana. It has all the features we needed when we certified the solution.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
Aug 9, 2024
I use the solution in my company for cybersecurity, securing perimeter networks, giving the user access to VPN, URL filtering, antivirus, sandblast, network segmentation, and monitoring purposes.
IT SecOps Manager at a tech services company with 11-50 employees
Real User
Top 20
Jul 29, 2024
We primarily use the product to block traffic at the application layer, limiting access to YouTube and social media during busy periods while allowing it during lunchtime or office hours.
The primary use case of many organizations is to protect their environments from outside cyber threats across multiple layers of infrastructure. For example: 1. At a perimeter level, it protects the network at the parameter; many organizations use this firewall. 2. It provides scalability and seamless traffic flow in a network. 3. It has all-in-one next-generation features, so many organizations save money using this firewall.
The tool helps with VPN and connecting mobile devices. We also use it for identity security. It filters internet access and controls applications. The firewall has an intrusion prevention system and stops data loss.
Systems Engineer at a tech services company with 11-50 employees
Real User
Top 5
Jul 22, 2024
It's just enterprise firewalls, firewall clusters for redundancy to secure the company network from the internet, and as well as a data center firewall, for example, if you want to split up subnets to control traffic between them.
My company is an IT service provider. We suggest customers choose the Check Point next-generation firewall along with other OEMs for their environment. Once they choose (and confirm the product with model capabilities), we migrate the existing firewall to the new firewall. I have deployed multiple Check Point products. Based on my experience and its effective features, I do suggest customers go with Check Point NGFW. I love its security profiles which effectively secure the organization's LAN, DC, and DMZ network.
Senior Network Security Engineer at ITCG SOlutions Pvt Ltd
Real User
Top 5
Jun 18, 2024
Check Point is mainly used for internal communication. Our clients have multiple platforms, and customers use it for internal communications and protection, from the DMZ to the LAN to the DMZ, and also for MPLS connectivity with multiple branches. As I've seen, the customers also use it as a gateway for publishing their website. This is only for the perimeter, however.
Director at a tech vendor with 5,001-10,000 employees
Reseller
Top 10
Jun 5, 2024
Generally speaking, it's like any other NGFW. It's quite a versatile solution for many aspects. It's not like a separate solution for firewalling, but a separate solution for web access. It's just very convenient to have everything in one box. On the other hand, when you need something, like a very top-rank solution for very specific things, like network intrusion prevention or network intrusion detection as a component of NGFW, I would say it looks weaker compared to the well-designed solution for its purpose. It has the same issue as many other versatile or unified solutions, so it's really convenient.
The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies.
Currently, we utilize Check Point firewalls, IPS, site-to-site VPN, and remote access VPN features for our various client operations. We have implemented a cloud firewall for one of our customers and primarily handle perimeter security using Check Point firewalls for multiple customers. We also handle POCs, implementation, upgrades, and daily security operations as part of our services. We are distributor partners who also distribute Check Point products to our customers. We recently convinced our clients to use Check Point firewall services and signed a contract with them.
The product is an excellent perimeter firewall solution. But compared to Palo Alto, the management console is critical. It's difficult to let customers understand the dashboard of the firewall because there are three distinct dashboards. The three dashboards include smart connect, Check Point Firewall dashboard and more. The solution is used by our organization for security purposes across small and medium banks in our country, who happen to be customers of our company.
Director of Enterprise Solution at KMD Company Limited
Real User
Top 5
Feb 7, 2024
In our logistics setup, we employ Check Point NGFW across various critical areas. For instance, we use it to secure different database applications within our systems, ensuring robust protection for our operations. Whether it is managing updates, maintaining standby reliability, or enhancing system performance, Check Point NGFW plays a vital role in safeguarding our logistics infrastructure.
Our customers find that the Check Point NGFW highly effective for data center deployments. Additionally, smaller models are well-suited for branch locations where local internet breakout is necessary. These smaller models streamline internet access at remote sites, eliminating the need for third-party service providers and reducing costs. The 26000 and 28000 series excel in securing DMZs, while the lower-end versions are ideal for branch-level internet breakout, allowing direct cloud connectivity without intermediary networks. It offers cost savings and efficient security solutions tailored to various deployment scenarios.
For Check Point, the main cases are just perimeter security, network security, basically detecting threats on the network, antivirus, application control, visibility, login, and data threat prevention.
Historically, the primary uses for these gateways were perimeter security and internet filtering. However, we now push all our internal traffic through the gateways for LAN segregation and to isolate obsolete operating systems. Our isolated operating systems and LANs only allow specific traffic from a specific source to access them, making these critical production/business systems more secure. It's not a simple case of just replacing these legacy operating systems but replacing the industrial machinery that they control - which would require an investment of tens of millions of pounds.
We use it for safeguarding our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios. Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.
We use Check Point Quantum Network Gateways for all our on-site firewalls. It protects the network edge, network core, data center, and our AWS direct connect. We are a payment facilitator and security is one of our core requirements. We have implemented VSX which enabled us to reduce the hardware footprint. We have implemented 6700NGFW, 6600NGFW, and 6400NGFW in different network segments. We have enabled basic firewall, ClusterXL, and IPS licensing. Due to the nature of the traffic, we do not use Application Control or URL Filtering.
The primary use case for this solution is to protect the devices under the firewall. There is a customer who has many switches and routers in their network. They are only protected by an old Cisco ASA firewall. So, the customer instead finds a new vendor or service, and thus we install the Check Point Firewall. Since the customer has many devices, it takes quite some time to move the Cisco ASA firewall rules to the Check Point policies. However, Check Point has a function to import the policies so it takes less time to do so. Still, the rules that were imported are a mess so we still need to check them one by one and fix the errors before installing them in the customer environment.
Network security architect at a energy/utilities company with 10,001+ employees
Real User
Top 10
Oct 11, 2023
The primary use case is segmentation in many different areas of the company network. We had a few critical use cases: there was a need for an internal firewall, and also an edge firewall. Apart from having simple segmentation, we had a requirement for additional features like the possibility to decrypt traffic, the possibility to inspect URLs or the intrusion prevention system feature. A very important thing for us was also to have a very good quality of vendor support. Definitely, this is something we can get here.
Technical Consultant at PT. Nusantara Compnet Integrator
Real User
Top 20
Oct 11, 2023
We use it as NGWF for the DMZ area on our data center. We deployed HA configuration of Check Point Quantum 6200 to protect our user connection to the internet and to protect the server farm in our data center. In our first year, we got free access to the full capability of SandBlast, the Check Point solution for sandboxing features. We tested, yet felt the sandbox is not quite needed in our environment and thus changed the subscription for the second year and forward to the standard feature. Check Point can also be integrated with third-party solutions like SIEM and so on.
Junior Cyber Security Analyst | CCSE | CCSA | CC at Security4IT
Real User
Oct 11, 2023
I usually apply Check Point to protect my customer's environment as a main solution boundary gateway, DMZ gateway, LAN gateway, or VPN site-to-site with other Check Point appliances and other vendors. I do a Harmony Endpoint full integration. I use other tools such as threat prevention blades (like IPS and IDS), anti-virus, anti-bot, anti-malware, and the Sandblast solution.
Flat Earth Networking, Inc. at Cyber Security Engineer
User
Oct 11, 2023
We have multiple customers that use this product. Integrated logging is the best around. It's clear and does the job it's supposed to do. We typically install this as the network edges and encourage our customers to have one at each location. Some prefer to backhall the smaller sites to the main branch where it handles all the inspection and rules. We also set up multifactor SSL VPN solutions at the main location which allows visibility into remote worker traffic. Overall, it's used mostly by small to medium businesses.
The solution is used for edge and interior firewalls. We use large-scale Check Points for our edge and have them set up in an active/passive cluster. For our internal firewalls at the remote sites, we use a virtual firewall for the OT DMZ, and then behind this virtual firewall, we have a physical appliance for the actual OT network. This allows us to fully secure the critical network yet still allow access via jump hosts or other remote management that we have approved. It also gives us excellent control over any north/south traffic.
Network and Security Administrator at CNR-ISTP - Consorzio RFX in Padua at Politecnico di Milano
Real User
Oct 11, 2023
We're an international research laboratory, focused on thermonuclear energy experiments. Due to strong remote collaboration, and to control network communication, we choose the Check Point NG Firewall solution. Most of the personnel are researchers. We also have a strong collaboration with a University and take care of a European Ph.D. on thermonuclear fusion, as the future clean energy.
Network and Security Engineer at BT - British Telecom
MSP
Oct 5, 2023
Our customer’s infrastructure is entirely based on Check Point. They are using around 2,000 firewalls worldwide. We resolve the problems in their product as a service provider.
It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades. Its integration with a web application firewall provides added protection.
Director, IT Infrastructure Management Department at Enat Bank S.C.
Real User
Top 20
Sep 21, 2023
We use Check Point Next-Generation Firewall as a perimeter firewall. This means that all incoming and outgoing traffic from our premises is routed through the Check Point firewall. Within our configuration, we have activated several security features and licenses, including the firewall itself, site-to-site VPN functionality, application and URL filtering, Identity Awareness, threat simulation, and anti-bot protection. Additionally, we possess the license for the NGpX version, which includes extraction capabilities.
We use the solution for full-scale integration and end-to-end management at the organization. The Check Point NGFW implementation took place quite smoothly. Check Point NGFW is the best in terms of comprehensive protection against network threats and security against malware and phishing attacks. It smoothly restricts these via anti-phishing algorithms. Check Point NGFW source package covers all the bases - application control, NAT, DLP, routing, content awareness, VPN, desktop security, and much more. It is scalable, provides end-to-end resolution and customized productive services like providing a complete solution for perimeter protection that blocks the traffic based on an IP address or on applications and content. This makes Check Point NGFW highly promising and makes it a complete solution.
We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop. Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Feb 15, 2023
Check Point NGFW proved to be highly scalable, secure, and stable, among other alternatives of multiple firewalls present in the market. At an organizational level, the integration and implementation of Check Point NGFW took place on a priority basis due to data and system security concerns against malware and phishing attacks. Check Point NGFW bifurcates, channels, and segregates the internal network and builds a secure VLAN, and separates it for every department. Check Point NGFW is highly scalable and provides end-to-end resolution and customized productive service making Check Point NGFW more promising and user-friendly than its alternatives and services like navigation, control, and filtering ensure that all users stay connected to business applications and restrict traffic.
Information Technology Specialist at Tech Mahindra
Real User
Top 20
Jan 26, 2023
Check Point Next Generation Firewall is one of the most secure and stable firewalls present in the market. the integration & implementation of Check Point Next Generation firewall took place due to security concerns, and we were impressed by what this product brings with it. The integration of Check Point Next Generation Firewall in my organization has taken over one year or so, and it helps to segregate the internal network and build a secure VLAN that separates every department. Scalability, end-to-end resolution, and customized productive services make Check Point Next Generation Firewall far better than the alternatives present in the market. It has services like navigation, control, and filtering that ensure that all users stay connected to business applications and helps restrict traffic.
We are currently migrating specific servers to the Azure cloud, so we are half in the cloud and half on-premise. For this reason, we needed to use a tool that would help us with this objective of being able to have both environments insured from vulnerabilities or dangers that occur in the network. Check Point NGFW came to implicate security tasks since it provided us with the ideal solutions to be able to keep all the organization's personnel safe from any malware penetration. The solution also brings certain innovative features that other brands do not offer.
We have deployed this software to provide comprehensive security beyond the Next Generation Firewall (NGFW). This software provides advanced analytics on any security measures that can have a great impact on our applications. It blocks malware attacks that can destroy data and leak confidential information to unauthorized parties. Check Point NGFW has helped the company to set up security policies that enhance the effective transfer of files and secure browsing strategies. There is improved prevention of external threats to data and increased production across the networking infrastructure.
We needed a perimeter solution that would add value to our organization by safeguarding our information, equipment, users, and all the infrastructure we have within our entire organization. We needed something that, in the future, had the capacity to be scalable as well as something that was easy to configure. We wanted to ensure that it could be configured in a way that, if high availability is required, it would be fine. In that search, we decided to try the NGFW from Check Point.
Senior Network Security Engineer at a consultancy with 10,001+ employees
Vendor
Top 20
Oct 3, 2022
I've been dealing with the Check Point environment for over eight years, ever since SPLAT, the R75 versions, and mainly with a multi-domain management (former Provider1) set-up. I also use the Smart Management Server, with a standalone/distributed deployment. I'm currently engaged in the design, implementation, and maintenance of a large-scale Check Point firewall environment (~100 GWs). Presently, the customer is using Check Point for perimeter security, IPS, threat prevention, encrypted traffic, as well as access to the internet, and multi-domain server architecture.
We are using these Next Generations Firewalls to segregate and protect our data center and business-critical data from the user LAN. We have some of the resources behind these firewalls which should be allowed to a certain set of users only. This is done using the authentication against the Active Directory groups and only the designated users are allowed to access the contents based on the firewall rules. Along with this, we use IPS and Antivirus features to protect our most critical network.
At the organizational level, we needed to protect the security of our organization. This is where a much broader need arises. We must protect each of the branches that our company has - in some cases larger than other branches. We took on the task of implementing a next-generation firewall from Check Point which allows us to have valuable equipment that adjusts to the needs of each of the branches according to their size and organizational demand by the number of users. This equipment is designed for infinity architecture.
We have different cloud platforms within the organization and needed a solution that would allow us to control different aspects of them from one single platform, which has allowed us to manage and apply policies across all different locations. It has allowed us to be more efficient with compliance and maintenance of all different platforms; management of the users is now tighter, and fewer resources have to be invested in applying all the needed policies and levels of access based on company roles.
Information Technology Security Specialist at AKBANK TAS
User
Jul 24, 2022
The product is basically for completing a firewall task. On top of that, the aim is to find a comprehensive solution with the innovations from next-gen. We made an isolated zone in a small part of the company. Here, we aimed to provide basic security features with few security devices. In this context, we ran the Check Point appliance by opening almost all the blades on it. The Check Point software architecture was able to provide quite good results because it ran on its own OS. It's pretty good as a VM. At a point where we wanted to isolate VM devices, we provided a solution with a VM series of Check Point.
Cybersecurity Operations Engineer at a tech services company with 201-500 employees
Real User
Top 20
May 23, 2022
I have been using this solution as a perimeter firewall. Our organization has ISP-based DDoS protection on the outer attack surface. Then, we have Check Point Next Generation Firewall with an IPS module as a second layer of protection. And then, we have Check Point Access Control, Application, and URL filtering, anti-virus, and anti-bot modules enabled. We also have the cloud-based Check Point Threat Emulation solution and different segmentations on Check Point Firewall as a DMZ zone, internal zone, and external zone. Our internal zones have different segments to improve our security level. We apply it by dividing our network into different VLANs by using the Check Point solution.
The solution is primarily used as an edge firewall safeguarding any organization or company which are really considering it as their number firewall of choice. In addition, there were also companies that are only using the specific blades, for example, IPS or IPsec, only as their primary solution. It is mostly used as an edge firewall. Sometimes, all security blades are utilized. As a significant part of the whole network infrastructure, Check Point delivers high detection and prevention rates when talking about suspicious and cyberattack types of activities.
Junior Security Engineer at PT Kereta Api Indonesia (Persero)
Real User
May 3, 2022
We use the solution for the DMZ firewall. It's very common and very easy to make configuration, Having IPsec for tunneling solutions with third-party routers and firewalls with other branch offices is very helpful. It offers support for segmentation networks. The geolocation feature makes it so that our company can easily allow or block a location of IP and can integrate with our SOC or our log management system. URL filtering is very powerful for blocking malicious connections. The user interface is very cool and easy to use. It has anti-DDOS protection which is very useful too.
Engineer Security Management at BT - British Telecom
MSP
Apr 30, 2022
I have used this product in chemicals, insurance, and industrial sector companies. The primary use case is to secure the inbound and outbound traffic and secure the DMZ servers. We use this solution for Remote access VPN (on smart view event can see reports more granular level) and IPSEC VPN for using the applications hosted on Public cloud and integrate the customer 3rd parties vendors. Using threat prevention helps in securing the customer environment from cyber attacks, ransomware, malwares etc. We use the Sandboxing features to protect the network from zero-day attacks
We initially started using the Check Point device for the VPN blade. After using the VPN blade for several months and using the hardware interface we found it very easy to use. The small business hardware device was powerful and easy to set up. We started using the firewall and Nat shortly after that. Having additional features like the threat prevention that has IPS antivirus antibot and threat emulation we're all added bonuses. This also gives us a piece of mind for the safety of our business.
PROFESIONAL GESTIÓN TIC at GOBERNACIÓN DEL TOLIMA
User
Feb 17, 2022
The main use of the Check Point NGFW in our organization is the protection of all of our on-site infrastructure. This includes all network elements, physical and virtual servers, end-user equipment, and all other elements that may be linked in the future within our infrastructure. The product is provisioned in a virtualized environment with the purpose of expanding resources whenever required and generating high availability of the services it offers us, both in the protection of applications through application control and the other blades that make up this solution.
Checkpoint Firewall provides advanced security for the organization and its connection to the members/participants. The Check Point FW controls access and traffic to and from the internal and external networks. The Check Point Firewall rule base defines the access control and network performance to help our organization achieve the below security goals: * Only allows authorized connections and prevents vulnerabilities in a network * Gives authorized users access to the correct internal networks * Optimizes network performance and efficiently inspects connections
We use Check Point for the firewall in DMZ and surrounding zones and another product we have. We use a variety of series from 2000, 4000, and 6000 gateways, and also we use Smart-1 and Maestro solutions. We apply some features (IPS - Intrusion Prevention System, application control, reporting, antivirus, and anti-spam) using Smart-1 to make day-to-day operation more simple and easy using one management for all gateways. The remote console, such as SSH, is a little complicated, however, you can use it for troubleshooting.
IT Security Administrator at a tech services company with 51-200 employees
Real User
Jan 20, 2022
We primarily use it for internet security. We use it for firewalling, ePass, and threat detection including anti-malware protection, bug protection, and social inspection. We can also use it for DLP.
It's a unified policy table that combines threat prevention and segmentation policies. Smart Event allows consolidated event management and exporting features is very useful when we need to deal in reports, since, for some time now, everyone has been working from home and on the firewall from Check Point. This function is implemented very conveniently and securely. The VPN over this firewall works as well as a standard VPN device. All in all, I'm delighted with their security solution. It is making configuring numerous layers of security policies easy to use and it always has been one of the things I liked most about their firewall solution.
I'm at a university in Queretaro, Mexico and it's used to protect our infrastructure: wireless, LAN, PCs. Since the solution prevents attacks, we have the checkpoint in all our equipment, from the critical infrastructure to the directors' and employees' cell phones.
We are using this product as a firewall which does have the capacity to block the IPS signature as well. It is highly accurate for the IPS engine and has the best-in-class log monitoring and report generating facility in the firewall. It is easy to manage, as it has a centralized management console. We are using the firewall as a VPN service as well. It is very easy to troubleshoot the issue with the VPN. We are using IPSEC features where we can enable tunnels with the client and we can safely communicate with vendors due to encryption.
Senior Infrastructure Technical Analyst at https://www.linkedin.com/in/robchaykoski/
User
Nov 22, 2021
I protect customers and other types of data by ensuring a secure environment. Check Point allows me to deploy quickly and securely, along with using more advanced detection and prevention. By securing multiple sites and various infrastructure elements, I have reduced my overall workload. I'm using a lot of permanent tunnels and protecting them to ensure that monitoring customer infrastructure is not compromised in any way, shape, or form. Various hardware has been deployed at proper sizing for customers and the equipment is stable without the need for a lot of custom configuration
The Check Point firewall is a reliable perimeter security product. Check Point gives me access to explore various security features in a single box (loaded with all features that an organization needs most). I can say I have been using it for one year and getting a grip on it and I will always try to implement it wherever it is required. When it comes to Check Point, there are great security features and a marvelous inbuilt design that caters to handling all threats, including zero-day attacks and perimeter security. I really like the user-friendly interface of the Smart Console dashboard and the maximum security is integrated.
Our business houses just over 100 staff, along with over 200 devices ranging from mobile to tablets, computers, laptops, and Servers. We use a Check Point 5100 cluster running R80.40 to protect our business from external threats. Our network is also extended to the likes of Microsoft Azure, Amazon AWS, and other 3rd parties utilizing secure VPN tunnels terminating on our Check Point 5100 cluster. Our business also offers the ability of hybrid working - which is only possible with our Check Point solution.
Snr Information Security Analyst at The Toronto Star
User
Nov 19, 2021
Check Point firewall is used as edge protection. Traffic to the internet and from the internet does go through the firewall where IPS, URL, and app policies are applied. Check Point was also used as an internal firewall to segment traffic between the data center and the user network. Basically, all traffic from any user will have to be inspected by an internal Check Point firewall before any server is accessed. Check Point is also used for PCI-DSS credit card checks within any email sent or received. This is effective in detecting credit card numbers within any email sent by a user in error and blocks that from being exposed.
I work for a systems integrator and have designed and deployed solutions over many years with Check Point components. Problems solved with Check Point NGFWs have included securing the edge, data center segregation, SWG replacement, Remote Access, and many others. I have designed and installed Check Point deployments from a single SMB appliance to multiple highly available chassis, running numerous virtual systems. Numerous different use cases include appliance form-factors, running modules, and licenses.
This is the perimeter firewall and manages all security facing towards the internet, It's a distributed solution composed of a Security Gateway and a Security Manager. It controls all the traffic from the LAN to the Internet and the VPN tunnels for connections with external partners. We control the traffic to the internet with blades as URL filtering to manage the bandwidth, limit the use of this resource, and apply the security policies as well as protect the LAN network against advanced threats from the internet to the servers and PCs.
We use the product to secure our network, using all Check Point has to offer, including multi-domain servers, centralized log servers, gateways on-premise, and VSX. It has improved a lot with the last versions making day-to-day operations very user-friendly. I have used almost all the blades Check Point has and it's incredible what a Next-Generation firewall is capable of, including VPN, IPS, monitoring, mobile access, compliance, and more. The reports of the Smart Event console are also very useful. It's good to have a view of what's going on in our network. Since Check Point has Linux working on them, it gives us plenty of tools to adapt to any specific need we have.
Senior IT Security Manager at a manufacturing company with 201-500 employees
User
Nov 18, 2021
We use the solution as a frontend firewall in our headquarters and in our branches. We use packet inspection, the antispam feature, and the VPN. We have configured threat prevention and content awareness to improve security on incoming email and on web surfing from interlan networks wits SSL inspection. Mobile access through the VPN mobile client is also used from all outside workers and is fully integrated with our AD. We also use the solution to route traffic on internal networks and manage security through client and server networks.
What can you do about threats that get past simple packet inspection by a regular firewall? You could have a layer 3 firewall inspect the protocol and block known threats from certain URLs, however, what if it comes from a URL that has not been reported and is a socially engineered exploit designed to hijack your data? This is where a Layer 7 firewall will be able to inspect the application, known as payload inspection. While this is possible to do with a Layer 3 firewall, it can be difficult due to the number of protocol messages in Layer 7. You would need to create a signature for each application you wanted to protect; however, network signatures tend to block legitimate data and increase your MTTR (mean time to resolve an issue). Plus, having these signatures makes it hard to manage and keep up with by the IT staff. Relying on the power of AI and the cloud in order to leverage the Layer 7 firewall is key. The advantage of Layer 7 is its protocol awareness, which allows it to differentiate between different network traffic (application knowledge) and not just packets or flows that identify ports and IPs (Layer 3).
Working in an MSP environment, there are more than a hundred firewalls and we use Check Point NGFW firewall which is mainly implemented as perimeter security and internal segmentation firewall. Due to our requirements, we implement site-to-site VPN between clients and cloud providers (AWS/Goggle/Azure). The centralized managed infrastructure makes it simple for the IT staff to operate and monitor the firewalls. The Smart Console provides a single pane of glass that allows the IT staff to easily manage the environment and troubleshoot issues.
My primary use case of this solution is for the data center in the perimeter security. We configure all of our security features like anti-boot, antivirus, and filtering.
I use the NGFW as a Firewalling device, for VPN tunneling, and for virtual patching. My environment is a two-tier network environment. I also use the Check Point NGFW as an IPS.
We first deployed Check Point for our clients. Our first client wanted to deploy the security appliances in a cluster solution for their network infrastructure solution. The NGTW chosen was the 5800 series and it was deployed as a software solution on clients' servers. Everything is going smoothly and the client seems happy with our proposal.
IT System Operations Manager at Hamamatsu Photonics KK
Real User
Oct 13, 2021
Check Point is currently our perimeter firewall at various locations. We use their failover clustering with high availability option, which performs flawlessly. Upgrades are easy to perform and have always worked reliably for us. Technical support is always available to assist with these operations, which makes the process less stressful to the admins. We are also using their ISP Redundancy feature, which works as advertised - perfectly! It's easy to implement, especially with the awesome documentation from our engineer. We also use their Remote Access VPN offering and have really seen its value this past year, due to COVID-19. The VPN has been 100% rock solid, especially during the most critical times in our history.
We are a Critical Access hospital with close to 1,000 endpoints and hundreds of users. We currently have multiple ISPs coming into the hospital for internet redundancy. There are multiple buildings on our campus that are connected with copper and fiber. We have had clinics in multiple cities attached to our network at various times. We installed the Check Point NGFW in our environment to act as our main firewall and gateway. This allows us to keep several of the vendor devices (lab analyzers and other third-party equipment) segregated on different VLANs so they have no access to our production VLAN. This system is also our VPN concentrator for several site to site VPNs and remote software VPN connections.
We needed to replace our external firewall solution as we were having issues with the HTTPS inspection on our previous solution and the level of support being provided was terrible, leaving us with an issue that could not be fixed for over six months. We had already deployed a new internal firewall solution but needed something that would protect that from external factors. We also needed a new solution to replace our client VPN solution. The Check Point solution gave us that as one whole solution instead of having to manage multiple services.
We use our Check Point NGFW firewall mainly for perimeter security. Those firewalls are placed at many sites distributed over Europe. We love the firewall management and think it's still the golden standard for creating a rule base and we go more and more in the direction of identity bases user access to secure our environment. The other firewall blades, such as Anti-Bot, Application and URL-Filtering, and IPS, are used on all sites. It's easy to deploy, as the firewall is able, with the latest version, to learn from the traffic and adapt the IPS policy.
We use Check Point firewalls to prevent attacks against the data center servers by adding more layers of security, such as IPS, Data Leak Prevention. We have also used Check Point to implement security policies in layer 7 and applications as well as to configure the VPN for internal users of the organization.
Works at a financial services firm with 10,001+ employees
User
Jul 14, 2021
I have been designing, deploying, implementing, and operating Check Point's Security solutions including NGFWs and EndPoint security as well as Remote Access VPNs, Intrusion Prevention systems, URL filtering, user identity, UTMs, et cetera, for around 12 years. I have also used VSX and MDS/MDLS solutions. In my organisation I am using over 150 virtual and physical appliances and also MDS for virtualized/contanerized central configuration management and also central log management MDLS/MLM. We are using this not just for NGFW but also for other Perimeter security solutions.
IT Manager at a comms service provider with 51-200 employees
Real User
Jun 25, 2021
It's our main firewall and the first line of protection from the outside! We use it to interconnect our remote locations (that use different vendors and equipment) and let the employees work remotely. We're a small site with 300 users and this equipment is more than enough for us. We use almost all the blades and the equipment has run smoothly for years. This NGFW monitors all the traffic outside of the main network, prevents malicious activities, and lets us easily manage network policies to shape our connections.
TitleManager - Datacenter IT at a manufacturing company with 10,001+ employees
Real User
Jun 15, 2021
The primary use of the solution is as an enterprise perimeter firewall in our data centers. We also use software blades for IPS/IDS functions as well. We have a combination of enterprise-grade firewalls like the 15000 and16000 series as well as mid-size versions like the 5000 and 6000 series which are for specific segment isolation or other purposes. The software blades are running on HP servers. Management is done via 5150 appliances. 5000 and 6000 series appliances are primarily used for segment isolation while the larger appliances are used for perimeter security.
We use this solution for permissions regarding access ports and services. We also use Check Point Remote Access VPN as an endpoint VPN. We use it for site-to-site configuration. All of the traffic that comes through our sites passes through our firewall. Basically, everyone, including our staff and clients, passes through our firewall. In other words, we have thousands of users using this solution.
We use Check Point NGFW for perimeter protection of our network from the internet. We also use it for threat protection at the network level and the endpoint level. We provide implementation, installation, and support services. We know about all types of firewalls, and we work with all types of installations. We usually use appliances, but in test environments, we use virtual appliances.
I use Check Point NGFW for controlling traffic and controlling access to the production server. It is a HA (high availability) environment. It is easy to use failover solutions. We use it on our disaster recovery (DR Site) and it runs smoothly.
Network Security Engineer at a consumer goods company with 201-500 employees
Real User
May 17, 2021
We primarily use this product for cloud computing security. It is an integration platform for IPS and I also use it for performance monitoring. I also coach classes on the use of this firewall, which is installed on my personal laptop.
Network security engineer at a tech services company with 1,001-5,000 employees
Real User
May 14, 2021
We use this solution for the VPN, from site-to-site and remote. We also use it for advanced IPS, IDS, malware protection, and the sandbox. The sandboxing functionality is one of the best features.
AVP - IT Security at a tech services company with 51-200 employees
Real User
May 10, 2021
We use this product for providing perimeter security, as well as advanced threat protection capabilities to critical infrastructure. The solution is expected to deliver high-performance throughput for voluminous traffic continuously. We are using these gateways for multiple functionalities such as: * Perimeter Gateways * Anti - APT (Advanced Persistent Threat) * Anti Malware / Anti Virus * SSL Inspection * Network Intrusion Prevention System * Private Threat Cloud All of our solutions are expected to run in high availability and have good resiliency.
We use this solution for complete protection against advanced zero-day threats with Threat Emulation and Threat Extraction. We also use: * NSS Recommended IPS to proactively prevent intrusions * Antivirus to identify and block malware * Anti-bot to detect and prevent bot damage * Anti-Spam to protect an organization's messaging infrastructure * Application Control to prevent high-risk application use * URL Filtering to prevent access to websites hosting malware * Identity Awareness to define policies for user and groups * Unified Policy that covers all web, applications, users, and machines * Logging and Status for proactive data analysis
IT Security & Networks Administrator at a financial services firm with 1,001-5,000 employees
Real User
Top 10
May 7, 2021
Our primary use case is as a perimeter firewall for main and DR sites for a financial institution. It secures Internet access for users through IPS/AV/Threat Emulation/Application control and URL filtering with HTTPS inspection and geolocation restrictions. It secures our email and MDM solutions. We also use it to create site-to-site VPNs with vendors. Remote access is achieved through the use of a secure workspace and SSL network extender. Securing and inspecting HTTP traffic to our web servers is another important task. It secures several DMZs and segregates them from the rest of the network. We use all of the security features available.
I'm a consultant at a Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I have deployed standalone, cluster, and two-layered firewalls.
CTO at a computer software company with 11-50 employees
Real User
May 5, 2021
We have a pretty small office and therefore, a small network environment, and the SMB appliances from Check Point were a perfect fit and exactly what we were looking for in order to improve our overall security posture in the office. It was critical for us to be able to secure our network, including intrusion detection and prevention along with threat emulation and extraction for zero-day threat help, and Check Point fit perfectly. After implementing the solution, we were able to get through a third-party penetration test of our network without issue.
Our branch offices and customer sites require Internet access for the on-site staff and remote access capabilities for after-hours and remote support. The Check Point firewalls allow us to provide site-to-site VPN, client VPN, web/app filtering, and IPS functionalities. Client VPN is leveraged by site staff due to the majority of our sites requiring 24-hour support and also allows centralized teams to remotely assist with multiple sites globally. We also use these at locations to provide security when our stand-alone network requires connectivity to the customer's network.
The role NGFW plays is to protect the organization against Layer 7 network attacks. The solution has helped us to guard our perimeter security on a wider level. This is not like plain vanilla firewall. We have got a wider visibility with the help of this next-generation firewall; it shows us the traffic flowing across the network and based upon that, we have made the modifications required to restrict access. Also, the active cluster module has helped us to balance the load during peak hours. Since moving to the active-active module, we have got the much-needed breathing space.
The primary use is to protect the organization from any kind of attack. It is able to isolate, secure, and control every device on the network at all times. Solutions should have the ability to block infected devices from accessing corporate data and assets. It provides access to the Internet for corporate resources in a secure manner. Our resources are used to host applications and services that are accessible to end-users over the Internet. It is used to provide required/limited access for third parties who want to connect to our corporate network. Access is granted based on application type and should be independent of port or protocol. It provides next-generation protection including IPS/Web Filtering/SSL decryption and more. It offers centralized policy management capabilities for all firewalls.
Geography and History Teacher at a comms service provider with 10,001+ employees
Real User
Top 10
Mar 26, 2021
In my company, we use the Check Point NG Firewall solution to secure the perimeter and user network. We use IPS/IDS, deep packet inspection, and VPN. We have implemented routing rules based on the destination of the traffic, and the performance of the global solution is satisfactory. We use the solution, too, as the firewall in a core node, which is very important to the business. It secures the network equipment and service integrity. We are delighted with the powerful management console and diagnostic tools.
Network, Systems and Security Engineer at SOLTEL Group
Real User
Mar 22, 2021
Nowadays, there are many threats and it's necessary to have an automatic process to defend your organization. The Check Point NGFW is a good solution for this use case.
We support various clients in the government sector in Mexico. We provide different solutions in terms of network security, data security, and perimeter security. The NGFM Firewall is available locally and different offices and/or institutions of the government sector pass through a more secure and controlled infrastructure. This type of infrastructure has different zones or areas that are managed and keeping them centralized has helped us to maintain and control them. In addition, we are generating fast and safe solutions for our users on each site.
Senior Network Engineer at LTI - Larsen & Toubro Infotech
Real User
Mar 18, 2021
We have deployed Check Point firewalls for perimeter security and also for filtering East-West traffic. Check Point helps in improving perimeter security along with giving insights into different kinds of traffic and attacks. Isolation between different tiers of APPs is critical for us and Check Point is utilized for handling high traffic volumes of East-West traffic. We are leveraging the VPN module on the perimeter firewall for users to access the VPNs. VPN authentication is integrated with RSA for multi-factor authentication.
We were looking for an easy, centrally-managed firewall infrastructure as we were using a standalone solution that was difficult to operate and maintain because it was composed of several different systems. We needed a solution that had support for virtual systems, and we needed such flexibility without increasing the cost by too much. On the other hand, comparing within the sector, Check Point NGFW has a good stack of security mechanisms (modules, aka blades in CKP terminology) that are easy to implement and use.
Technology consultant at a tech services company with 501-1,000 employees
Real User
Mar 15, 2021
We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers. Currently, we are using the R80.20 firmware version and we have a pretty simple design. Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.
Network Security Engineer at a tech services company with 10,001+ employees
Real User
Mar 4, 2021
The purpose of using the firewall is to protect the users from the external network, internet. Apart from that, we have set up IPsec tunnels between two different sites, and for internal usage, between two different zones, we use these firewalls as well. Our environment consists of a 3-tier architecture, which is recommended by Check Point. We use the central management system to manage our 3-tier architecture, and we use the Smart Console as well.
We use this solution as a layer 3/4 firewall deploying access rules in our DMZ. We have more than six different centers with different service layers, a core of up to 500Gb per site, and other service centers providing security for all inbound and outbound connections. VSX gives us the capacity to consolidate hardware in fewer devices, reducing the OPEX, and creating different VFWs to provide service to different environments or services. Layer 7 features allow us to upgrade our security services. Activating the required features only requires upgrading the license.
In today's world, we can't completely rely on traditional signature-based devices, as technology involving cyberattacks is becoming more sophisticated. We require an all-in-one solution that can defend against newly-created attacks, necessitating the usage of NGFW firewalls. This is where Check Point comes into the picture. Our environment contains multiple roaming users, where we have to extend trust beyond the organizational network. Not only is there east-west traffic to deal with, but a large volume of north-south traffic, as well. We are required to monitor all of the traffic, which includes many branch offices connected centrally. Monitoring Data via DLP in such a scenario, we require a single solution, which is nothing but Checkpoint.
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Feb 18, 2021
I work as an internal network team member. We protect the company environment from outside threats, outside viruses, and ransomware attacks. It is kind of an IT administrator job. They are protecting internal security as well as giving us security from the outside world or public environment.
Network Associate at a wireless company with 1,001-5,000 employees
Real User
Feb 17, 2021
We use firewalls to protect our private environment from the public environment. My IT group is in charge of protecting the environment and maintaining safe usage of the internet. This product gives us a better, safer solution for the users within our company.
Network Security Assurance Specialist at Visa Inc.
Real User
Jan 18, 2021
The main use case is Firewall provisioning and integration with Tufin and Skybox. Also, we focus on firewall compliance, rule review, VPN configuration, and network troubleshooting.
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Dec 14, 2020
We use Check Point firewalls to secure our internal network from the outside world and to provide a good, comfortable, and secure environment for our employees. We have various models from the R80 series, such as the R80.10 and the R80.30.
Senior Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Nov 9, 2020
We use the solution to protect our organization and workers from the outside Internet or any untrusted network. We have the three-tier architecture of Check Point. We use its consoles, central management system, and firewall device for managing it. This three-tier architecture is recommended by the Check Point Community.
Sr. Network Engineer at a tech services company with 51-200 employees
Real User
Oct 13, 2020
We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world. I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances.
Firewall Administrator at a tech services company with 1,001-5,000 employees
Real User
Sep 27, 2020
We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.
Check Point Quantum Force NGFW provides centralized management with scalable security for network perimeters. As a reliable firewall, it ensures advanced threat prevention and offers seamless integration, making it suitable for various network environments.Offering comprehensive security, Check Point Quantum Force NGFW helps control ingress and egress traffic, secures data center firewalls, and integrates seamlessly with cloud and on-premises setups. Users appreciate its application control,...
I use Check Point Quantum Force (NGFW) mainly as a next-generation firewall to secure network traffic, most often for threat prevention, IPS, and managing segmentation across different environments. In my case, I often use Check Point Quantum Force (NGFW) to segment sensitive servers from the rest of the network and enforce stricter IPS profiles on that zone. For example, if I notice unusual traffic hitting a critical server, Check Point Quantum Force (NGFW) usually flags it and blocks it.
In my organization, the main use case for Check Point Quantum Force (NGFW) is to connect our private network to the public network, and we have two ISP links connected to our firewall. We have NATed our private IP to these two ISP links. Whatever traffic needed to flow to the internet goes to these two ISPs, with all the NATing, user control, and security configured in Check Point Quantum Force (NGFW). This is what every organization needs right now because to provide a first layer of defense, connectivity to the internet, and user control, we can achieve all of this through any Next Generation Firewall, and Check Point Quantum Force (NGFW) is among those providers, being very reputed and providing a good solution with stability.
My main use case for Check Point Quantum Force (NGFW) is to provide internet reachability to our private network to the public network, and that is basically a primary use case. The secondary use case is to provide a remote access VPN, which is a feature of that firewall. Additionally, we are using branch connectivity with the help of Check Point Quantum Force (NGFW). We are using Check Point Quantum Force (NGFW) as a first layer of security defense, so these are four major use cases we are using right now. I can give you a specific example of how I use Check Point Quantum Force (NGFW) for internet reachability or remote access VPN in my daily work. Every day, more than hundreds of employees come to our office and connect their laptops and desktops. All these private IPs are able to browse anything on the internet securely with the help of Check Point Quantum Force (NGFW). Even if they require any communication from the branch office, they are connected through the IPsec tunnel, which is a feature of this firewall, so they are able to reach the other side private network as well.
My main use case for Check Point Quantum Force (NGFW) is advanced threat prevention and IPS. A specific example of how I use Check Point Quantum Force (NGFW) for advanced threat prevention and IPS in my daily work is utilizing cloud native and API friendly deployment architecture, ensuring availability of recognition and ease of management. I protect public facing web applications, API security, and bot and DDoS attack protection as part of my daily use case with Check Point Quantum Force (NGFW).
My main use case for Check Point Quantum Force (NGFW) is to provide connectivity from our private LAN network to the WAN side, and for internet reachability. A specific example of how Check Point Quantum Force (NGFW) helps with our private LAN networks is that in our private network, there is no reachability to the internet without any security or next-generation firewall. We have deployed this solution and our private network got NATted in the device, establishing connection to the internet. We are also using Check Point Quantum Force (NGFW) for security purposes and user control.
All the internet traffic from LAN to WAN passes through Check Point Quantum Force (NGFW), so all the inspection, threat inspection, app control, user control, and threat prevention configurations are implemented in Check Point Quantum Force (NGFW). With the help of Check Point Quantum Force (NGFW), we are able to access the internet in a secure manner, and the private IPs are NATed in this device.
I'm using Check Point Quantum Force (NGFW) as our internet gateways and I use it as SSL decryption as well as URL filtering. In my organization, I use Check Point Quantum Force (NGFW) to limit all applications that are not required for our organizations. For example, when YouTube or Facebook needs to be blocked via application, YouTube cannot be blocked directly. We need to do SSL decryption so that the firewall can see all packets, inspect them, and block necessary applications and URLs.
Our main use case for Check Point Quantum Force (NGFW) is to provide internet connectivity to our private network users, and we are using a device for internet connectivity, other branches connectivity, and SSL remote access VPN users. We have branch to branch connectivity to our headquarters using Check Point Quantum Force (NGFW), so our branch users access private resources and servers from the local private network with the help of IPsec VPN.
Our main use case for Check Point Quantum Force (NGFW) is as a security gateway in our network, isolating our private network from the WAN side with the help of Check Point Quantum Force (NGFW), and we rely on it for features such as VPN, application control, URL filtering, sandboxing, and IPS. Instead of taking multiple devices for VPNs, application control, or sandboxing, Check Point Quantum Force (NGFW) provides all these features with a software blade architecture in the box. We have taken the license for VPN, application control, URL filtering, IPS, sandboxing, and antivirus to prevent outside threats efficiently and secure our private network and resources. We are using Check Point Quantum Force (NGFW) to connect our other branches, as we have multiple branches in different Indian states connected through an IPsec tunnel, which is a feature of Check Point Quantum Force (NGFW).
My main use case for Check Point Quantum Force (NGFW) is to use it as a security gateway where we have configured SSL VPN, IPsec VPN and configured firewall for network security. I am using Check Point Quantum Force (NGFW) to provide our employees remote access VPN, as well as security while accessing any website to secure them from cyber threats. All use cases for Check Point Quantum Force (NGFW) are covered.
My main use case for Check Point Quantum Force (NGFW) is perimeter security. In practice, I am protecting a data center.
My main use case for Check Point Quantum Force (NGFW) is segmentation of VLANs, and the logging feature is great for my day-to-day operations. A specific example of how I use segmentation and logging in my environment involves segmenting equipment into different VLANs, terminating all the VLANs on the Check Point firewall, and using the logging features to debug what's happening if there are any issues.
In our customer environment, Check Point Quantum Force (NGFW) is used for edge security and internal security, both for data center and edge side. We don't have Check Point Quantum Force (NGFW) personally. We install it for our customers and then take care of it.
My main use case for Check Point Quantum Force (NGFW) is that we use it for a perimeter firewall and separation firewall.
My main use case for Check Point NGFW is using it as our data center firewall, which basically keeps the resources behind the data center safe from all the different cybersecurity threats. Check Point NGFW has made a difference for our data center, especially when some people at some point tried to spoof their IPs within the organization, and upon checking the logs, we found a couple of IPs that had been blocked because they were trying to get in from a different network where we don't expect those IPs, so the traffic was denied because of the IP spoofing setup.
My main use case for Check Point NGFW is that it was deployed at the network edge to protect and manage incoming and outgoing traffic from the corporate network, which is controlled by Check Point firewall. We have implemented application control, URL filtering, content filtering, and similar features. This enables us to manage the traffic by creating granular policies, IP space, or user-based policies. The main use case is to control the inward traffic and stop cyber threats at the network edge only.
We primarily use Azure DevOps for source control with Git, CI/CD pipelines, and project management using Azure Boards, and it's pretty much the core of our development workflow.
My main use case for Check Point NGFW is that my organization is using it as a firewall and using it in emails also.
The main use case for Check Point NGFW involves securing organizational network parameters from a wide range of cyber threats, such as those associated with malware, unauthorized access, and data exfiltration.
The main use case for Check Point NGFW is providing perimeter security, as the Check Point firewall is deployed at the edge to control all incoming and outgoing north-south traffic, used as a combination of features including URL filtering, application control, IPS, content awareness, identity provider, IPsec tunnel, and SSL VPNs, and was specifically deployed in one of the head office locations as a perimeter firewall to control all in-out traffic.
We use Check Point NGFW ( /products/check-point-ngfw-reviews ) for separating the IT networks from the OT networks. It provides advanced threat prevention, access control, IP policy, zoning, virtual interfaces, and NAT capabilities. While it also provides VPN, we are currently not using it but are exploring the option.
The checkpoint firewall is used as perimeter security for HO Location of the organisation. It is deployed at edge to use it as next gen firewall including features like, Antivirus, IPS, Application control, URL Filtering etc. Check Point Firewall offers strong NGFW (Next-Generation Firewall) features with smart security blades like IPS, Application Control, URL Filtering, Antivirus, Anti-Bot, Threat Emulation, and more—all in one device. It’s easy to integrate with other systems like Active Directory, SIEMs, and cloud platforms. I like how well it scales—whether it's a small office or a big enterprise, it works smoothly. The SmartConsole gives one place to manage everything. Tech support is knowledgeable and helpful, especially if you have a support plan. What makes Check Point unique is its ThreatCloud intelligence and the ability to create very detailed, identity-based rules. It also lets you handle complex networks with great control and visibility. Overall, it’s secure, flexible, and built for professionals who want full control over their network. If you know checkpoint product well its easy to use and implement
We were looking for a solution to simplify our hybrid cloud infrastructure. We wanted something that could manage both our on-premises and cloud environments seamlessly. Nutanix offered that unified management plane. We also needed to improve our disaster recovery capabilities.
We use Check Point NGFW ( /products/check-point-ngfw-reviews ) for edge firewalls as well as internal segregation firewalls. It easily allows us to separate critical traffic from non-critical office traffic.
We use Check Point NGFW for enterprise firewalling, VPN, data loss prevention (DLP), user authentication, and zero-trust connectivity. All the functions of Check Point NGFW are utilized.
We are working with Check Point NGFW ( /products/check-point-ngfw-reviews ) as an internet firewall, a data center firewall, and a core firewall. We also deal with customers using the Maestro firewall for data centers.
I do not use them, I just sell them, but customers are using them to protect on the edge and at the core.
I use Check Point NGFW in my role as an Information Technology Security Engineer. We have implemented it for our customers and use it ourselves.
We are using the solution for the perimeter. It's used as a core firewall, with almost all transactions passing through the firewall. For instance, in a cellular phone company, all transactional authorizations pass through the firewall, while in a bank, authorizations for branches and ATMs go through the firewall. The main customers are in the BFSI, telcos, industry manufacturing, and other large enterprise sectors.
We needed stateful inspection, logging, integration with Active Directory, and the ability to monitor devices using standard SNMP for use cases. Now, with the tool's Skyline product and OpenTelemetry, we can monitor it through Prometheus and Grafana. It has all the features we needed when we certified the solution.
The primary use case of this solution is to protect the organization's LAN network from cyber threats.
I use the solution in my company for cybersecurity, securing perimeter networks, giving the user access to VPN, URL filtering, antivirus, sandblast, network segmentation, and monitoring purposes.
We primarily use the product to block traffic at the application layer, limiting access to YouTube and social media during busy periods while allowing it during lunchtime or office hours.
The primary use case of many organizations is to protect their environments from outside cyber threats across multiple layers of infrastructure. For example: 1. At a perimeter level, it protects the network at the parameter; many organizations use this firewall. 2. It provides scalability and seamless traffic flow in a network. 3. It has all-in-one next-generation features, so many organizations save money using this firewall.
The tool helps with VPN and connecting mobile devices. We also use it for identity security. It filters internet access and controls applications. The firewall has an intrusion prevention system and stops data loss.
It's just enterprise firewalls, firewall clusters for redundancy to secure the company network from the internet, and as well as a data center firewall, for example, if you want to split up subnets to control traffic between them.
My company is an IT service provider. We suggest customers choose the Check Point next-generation firewall along with other OEMs for their environment. Once they choose (and confirm the product with model capabilities), we migrate the existing firewall to the new firewall. I have deployed multiple Check Point products. Based on my experience and its effective features, I do suggest customers go with Check Point NGFW. I love its security profiles which effectively secure the organization's LAN, DC, and DMZ network.
Check Point is mainly used for internal communication. Our clients have multiple platforms, and customers use it for internal communications and protection, from the DMZ to the LAN to the DMZ, and also for MPLS connectivity with multiple branches. As I've seen, the customers also use it as a gateway for publishing their website. This is only for the perimeter, however.
We use the solution for threat protection in the banking and finance sectors.
Generally speaking, it's like any other NGFW. It's quite a versatile solution for many aspects. It's not like a separate solution for firewalling, but a separate solution for web access. It's just very convenient to have everything in one box. On the other hand, when you need something, like a very top-rank solution for very specific things, like network intrusion prevention or network intrusion detection as a component of NGFW, I would say it looks weaker compared to the well-designed solution for its purpose. It has the same issue as many other versatile or unified solutions, so it's really convenient.
The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies.
Currently, we utilize Check Point firewalls, IPS, site-to-site VPN, and remote access VPN features for our various client operations. We have implemented a cloud firewall for one of our customers and primarily handle perimeter security using Check Point firewalls for multiple customers. We also handle POCs, implementation, upgrades, and daily security operations as part of our services. We are distributor partners who also distribute Check Point products to our customers. We recently convinced our clients to use Check Point firewall services and signed a contract with them.
Primarily, it's used for customers who want to add their network security.
The product is an excellent perimeter firewall solution. But compared to Palo Alto, the management console is critical. It's difficult to let customers understand the dashboard of the firewall because there are three distinct dashboards. The three dashboards include smart connect, Check Point Firewall dashboard and more. The solution is used by our organization for security purposes across small and medium banks in our country, who happen to be customers of our company.
In our logistics setup, we employ Check Point NGFW across various critical areas. For instance, we use it to secure different database applications within our systems, ensuring robust protection for our operations. Whether it is managing updates, maintaining standby reliability, or enhancing system performance, Check Point NGFW plays a vital role in safeguarding our logistics infrastructure.
Our customers find that the Check Point NGFW highly effective for data center deployments. Additionally, smaller models are well-suited for branch locations where local internet breakout is necessary. These smaller models streamline internet access at remote sites, eliminating the need for third-party service providers and reducing costs. The 26000 and 28000 series excel in securing DMZs, while the lower-end versions are ideal for branch-level internet breakout, allowing direct cloud connectivity without intermediary networks. It offers cost savings and efficient security solutions tailored to various deployment scenarios.
We use the tool as a data center firewall. Some of our customers use it as a perimeter firewall. We are only using the security gateway.
For Check Point, the main cases are just perimeter security, network security, basically detecting threats on the network, antivirus, application control, visibility, login, and data threat prevention.
We use the product as a firewall solution for application control, defined rules and policies, and insights features.
Historically, the primary uses for these gateways were perimeter security and internet filtering. However, we now push all our internal traffic through the gateways for LAN segregation and to isolate obsolete operating systems. Our isolated operating systems and LANs only allow specific traffic from a specific source to access them, making these critical production/business systems more secure. It's not a simple case of just replacing these legacy operating systems but replacing the industrial machinery that they control - which would require an investment of tens of millions of pounds.
We use it for safeguarding our office network on a routine basis. These firewalls protect against external threats, manage VPN access for remote users, and address various security scenarios. Our primary focus involves malware prevention, intrusion detection, and ensuring robust security measures to shield our office network from potential cyber threats originating from the internet. It serves as a traditional yet effective security system, providing comprehensive protection against hackers and potential risks associated with internet usage.
The solution is our main firewall. It protects our perimeter.
We use Check Point Quantum Network Gateways for all our on-site firewalls. It protects the network edge, network core, data center, and our AWS direct connect. We are a payment facilitator and security is one of our core requirements. We have implemented VSX which enabled us to reduce the hardware footprint. We have implemented 6700NGFW, 6600NGFW, and 6400NGFW in different network segments. We have enabled basic firewall, ClusterXL, and IPS licensing. Due to the nature of the traffic, we do not use Application Control or URL Filtering.
The primary use case for this solution is to protect the devices under the firewall. There is a customer who has many switches and routers in their network. They are only protected by an old Cisco ASA firewall. So, the customer instead finds a new vendor or service, and thus we install the Check Point Firewall. Since the customer has many devices, it takes quite some time to move the Cisco ASA firewall rules to the Check Point policies. However, Check Point has a function to import the policies so it takes less time to do so. Still, the rules that were imported are a mess so we still need to check them one by one and fix the errors before installing them in the customer environment.
We use the solution as a perimeter firewall. We also use it for endpoint security and VPN.
The primary use case is segmentation in many different areas of the company network. We had a few critical use cases: there was a need for an internal firewall, and also an edge firewall. Apart from having simple segmentation, we had a requirement for additional features like the possibility to decrypt traffic, the possibility to inspect URLs or the intrusion prevention system feature. A very important thing for us was also to have a very good quality of vendor support. Definitely, this is something we can get here.
We use it as NGWF for the DMZ area on our data center. We deployed HA configuration of Check Point Quantum 6200 to protect our user connection to the internet and to protect the server farm in our data center. In our first year, we got free access to the full capability of SandBlast, the Check Point solution for sandboxing features. We tested, yet felt the sandbox is not quite needed in our environment and thus changed the subscription for the second year and forward to the standard feature. Check Point can also be integrated with third-party solutions like SIEM and so on.
I usually apply Check Point to protect my customer's environment as a main solution boundary gateway, DMZ gateway, LAN gateway, or VPN site-to-site with other Check Point appliances and other vendors. I do a Harmony Endpoint full integration. I use other tools such as threat prevention blades (like IPS and IDS), anti-virus, anti-bot, anti-malware, and the Sandblast solution.
We have multiple customers that use this product. Integrated logging is the best around. It's clear and does the job it's supposed to do. We typically install this as the network edges and encourage our customers to have one at each location. Some prefer to backhall the smaller sites to the main branch where it handles all the inspection and rules. We also set up multifactor SSL VPN solutions at the main location which allows visibility into remote worker traffic. Overall, it's used mostly by small to medium businesses.
The solution is used for edge and interior firewalls. We use large-scale Check Points for our edge and have them set up in an active/passive cluster. For our internal firewalls at the remote sites, we use a virtual firewall for the OT DMZ, and then behind this virtual firewall, we have a physical appliance for the actual OT network. This allows us to fully secure the critical network yet still allow access via jump hosts or other remote management that we have approved. It also gives us excellent control over any north/south traffic.
We're an international research laboratory, focused on thermonuclear energy experiments. Due to strong remote collaboration, and to control network communication, we choose the Check Point NG Firewall solution. Most of the personnel are researchers. We also have a strong collaboration with a University and take care of a European Ph.D. on thermonuclear fusion, as the future clean energy.
Our customer’s infrastructure is entirely based on Check Point. They are using around 2,000 firewalls worldwide. We resolve the problems in their product as a service provider.
It offers a range of models to enhance network security and it can be customized to secure endpoint client machines or user devices by deploying features like malware detection, antivirus, and mail security blades. Its integration with a web application firewall provides added protection.
We use Check Point Next-Generation Firewall as a perimeter firewall. This means that all incoming and outgoing traffic from our premises is routed through the Check Point firewall. Within our configuration, we have activated several security features and licenses, including the firewall itself, site-to-site VPN functionality, application and URL filtering, Identity Awareness, threat simulation, and anti-bot protection. Additionally, we possess the license for the NGpX version, which includes extraction capabilities.
We use the solution to configure sandboxing features for enterprises. We also use it for policy-level configurations and VPNs.
We use it for our core firewall and also for VPN.
We use the solution for full-scale integration and end-to-end management at the organization. The Check Point NGFW implementation took place quite smoothly. Check Point NGFW is the best in terms of comprehensive protection against network threats and security against malware and phishing attacks. It smoothly restricts these via anti-phishing algorithms. Check Point NGFW source package covers all the bases - application control, NAT, DLP, routing, content awareness, VPN, desktop security, and much more. It is scalable, provides end-to-end resolution and customized productive services like providing a complete solution for perimeter protection that blocks the traffic based on an IP address or on applications and content. This makes Check Point NGFW highly promising and makes it a complete solution.
We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop. Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.
Check Point NGFW proved to be highly scalable, secure, and stable, among other alternatives of multiple firewalls present in the market. At an organizational level, the integration and implementation of Check Point NGFW took place on a priority basis due to data and system security concerns against malware and phishing attacks. Check Point NGFW bifurcates, channels, and segregates the internal network and builds a secure VLAN, and separates it for every department. Check Point NGFW is highly scalable and provides end-to-end resolution and customized productive service making Check Point NGFW more promising and user-friendly than its alternatives and services like navigation, control, and filtering ensure that all users stay connected to business applications and restrict traffic.
Check Point Next Generation Firewall is one of the most secure and stable firewalls present in the market. the integration & implementation of Check Point Next Generation firewall took place due to security concerns, and we were impressed by what this product brings with it. The integration of Check Point Next Generation Firewall in my organization has taken over one year or so, and it helps to segregate the internal network and build a secure VLAN that separates every department. Scalability, end-to-end resolution, and customized productive services make Check Point Next Generation Firewall far better than the alternatives present in the market. It has services like navigation, control, and filtering that ensure that all users stay connected to business applications and helps restrict traffic.
We are currently migrating specific servers to the Azure cloud, so we are half in the cloud and half on-premise. For this reason, we needed to use a tool that would help us with this objective of being able to have both environments insured from vulnerabilities or dangers that occur in the network. Check Point NGFW came to implicate security tasks since it provided us with the ideal solutions to be able to keep all the organization's personnel safe from any malware penetration. The solution also brings certain innovative features that other brands do not offer.
We have deployed this software to provide comprehensive security beyond the Next Generation Firewall (NGFW). This software provides advanced analytics on any security measures that can have a great impact on our applications. It blocks malware attacks that can destroy data and leak confidential information to unauthorized parties. Check Point NGFW has helped the company to set up security policies that enhance the effective transfer of files and secure browsing strategies. There is improved prevention of external threats to data and increased production across the networking infrastructure.
We needed a perimeter solution that would add value to our organization by safeguarding our information, equipment, users, and all the infrastructure we have within our entire organization. We needed something that, in the future, had the capacity to be scalable as well as something that was easy to configure. We wanted to ensure that it could be configured in a way that, if high availability is required, it would be fine. In that search, we decided to try the NGFW from Check Point.
I've been dealing with the Check Point environment for over eight years, ever since SPLAT, the R75 versions, and mainly with a multi-domain management (former Provider1) set-up. I also use the Smart Management Server, with a standalone/distributed deployment. I'm currently engaged in the design, implementation, and maintenance of a large-scale Check Point firewall environment (~100 GWs). Presently, the customer is using Check Point for perimeter security, IPS, threat prevention, encrypted traffic, as well as access to the internet, and multi-domain server architecture.
We are using these Next Generations Firewalls to segregate and protect our data center and business-critical data from the user LAN. We have some of the resources behind these firewalls which should be allowed to a certain set of users only. This is done using the authentication against the Active Directory groups and only the designated users are allowed to access the contents based on the firewall rules. Along with this, we use IPS and Antivirus features to protect our most critical network.
At the organizational level, we needed to protect the security of our organization. This is where a much broader need arises. We must protect each of the branches that our company has - in some cases larger than other branches. We took on the task of implementing a next-generation firewall from Check Point which allows us to have valuable equipment that adjusts to the needs of each of the branches according to their size and organizational demand by the number of users. This equipment is designed for infinity architecture.
We have different cloud platforms within the organization and needed a solution that would allow us to control different aspects of them from one single platform, which has allowed us to manage and apply policies across all different locations. It has allowed us to be more efficient with compliance and maintenance of all different platforms; management of the users is now tighter, and fewer resources have to be invested in applying all the needed policies and levels of access based on company roles.
The product is basically for completing a firewall task. On top of that, the aim is to find a comprehensive solution with the innovations from next-gen. We made an isolated zone in a small part of the company. Here, we aimed to provide basic security features with few security devices. In this context, we ran the Check Point appliance by opening almost all the blades on it. The Check Point software architecture was able to provide quite good results because it ran on its own OS. It's pretty good as a VM. At a point where we wanted to isolate VM devices, we provided a solution with a VM series of Check Point.
I have been using this solution as a perimeter firewall. Our organization has ISP-based DDoS protection on the outer attack surface. Then, we have Check Point Next Generation Firewall with an IPS module as a second layer of protection. And then, we have Check Point Access Control, Application, and URL filtering, anti-virus, and anti-bot modules enabled. We also have the cloud-based Check Point Threat Emulation solution and different segmentations on Check Point Firewall as a DMZ zone, internal zone, and external zone. Our internal zones have different segments to improve our security level. We apply it by dividing our network into different VLANs by using the Check Point solution.
The solution is primarily used as an edge firewall safeguarding any organization or company which are really considering it as their number firewall of choice. In addition, there were also companies that are only using the specific blades, for example, IPS or IPsec, only as their primary solution. It is mostly used as an edge firewall. Sometimes, all security blades are utilized. As a significant part of the whole network infrastructure, Check Point delivers high detection and prevention rates when talking about suspicious and cyberattack types of activities.
We use the solution for the DMZ firewall. It's very common and very easy to make configuration, Having IPsec for tunneling solutions with third-party routers and firewalls with other branch offices is very helpful. It offers support for segmentation networks. The geolocation feature makes it so that our company can easily allow or block a location of IP and can integrate with our SOC or our log management system. URL filtering is very powerful for blocking malicious connections. The user interface is very cool and easy to use. It has anti-DDOS protection which is very useful too.
I have used this product in chemicals, insurance, and industrial sector companies. The primary use case is to secure the inbound and outbound traffic and secure the DMZ servers. We use this solution for Remote access VPN (on smart view event can see reports more granular level) and IPSEC VPN for using the applications hosted on Public cloud and integrate the customer 3rd parties vendors. Using threat prevention helps in securing the customer environment from cyber attacks, ransomware, malwares etc. We use the Sandboxing features to protect the network from zero-day attacks
We initially started using the Check Point device for the VPN blade. After using the VPN blade for several months and using the hardware interface we found it very easy to use. The small business hardware device was powerful and easy to set up. We started using the firewall and Nat shortly after that. Having additional features like the threat prevention that has IPS antivirus antibot and threat emulation we're all added bonuses. This also gives us a piece of mind for the safety of our business.
We use Check Point NGFW as a perimeter firewall.
The main use of the Check Point NGFW in our organization is the protection of all of our on-site infrastructure. This includes all network elements, physical and virtual servers, end-user equipment, and all other elements that may be linked in the future within our infrastructure. The product is provisioned in a virtualized environment with the purpose of expanding resources whenever required and generating high availability of the services it offers us, both in the protection of applications through application control and the other blades that make up this solution.
Checkpoint Firewall provides advanced security for the organization and its connection to the members/participants. The Check Point FW controls access and traffic to and from the internal and external networks. The Check Point Firewall rule base defines the access control and network performance to help our organization achieve the below security goals: * Only allows authorized connections and prevents vulnerabilities in a network * Gives authorized users access to the correct internal networks * Optimizes network performance and efficiently inspects connections
We use Check Point for the firewall in DMZ and surrounding zones and another product we have. We use a variety of series from 2000, 4000, and 6000 gateways, and also we use Smart-1 and Maestro solutions. We apply some features (IPS - Intrusion Prevention System, application control, reporting, antivirus, and anti-spam) using Smart-1 to make day-to-day operation more simple and easy using one management for all gateways. The remote console, such as SSH, is a little complicated, however, you can use it for troubleshooting.
We primarily use it for internet security. We use it for firewalling, ePass, and threat detection including anti-malware protection, bug protection, and social inspection. We can also use it for DLP.
It's a unified policy table that combines threat prevention and segmentation policies. Smart Event allows consolidated event management and exporting features is very useful when we need to deal in reports, since, for some time now, everyone has been working from home and on the firewall from Check Point. This function is implemented very conveniently and securely. The VPN over this firewall works as well as a standard VPN device. All in all, I'm delighted with their security solution. It is making configuring numerous layers of security policies easy to use and it always has been one of the things I liked most about their firewall solution.
I'm at a university in Queretaro, Mexico and it's used to protect our infrastructure: wireless, LAN, PCs. Since the solution prevents attacks, we have the checkpoint in all our equipment, from the critical infrastructure to the directors' and employees' cell phones.
We are using this product as a firewall which does have the capacity to block the IPS signature as well. It is highly accurate for the IPS engine and has the best-in-class log monitoring and report generating facility in the firewall. It is easy to manage, as it has a centralized management console. We are using the firewall as a VPN service as well. It is very easy to troubleshoot the issue with the VPN. We are using IPSEC features where we can enable tunnels with the client and we can safely communicate with vendors due to encryption.
We deploy solutions for customers. We don't engage in buying. We are both consultants and implementers.
I protect customers and other types of data by ensuring a secure environment. Check Point allows me to deploy quickly and securely, along with using more advanced detection and prevention. By securing multiple sites and various infrastructure elements, I have reduced my overall workload. I'm using a lot of permanent tunnels and protecting them to ensure that monitoring customer infrastructure is not compromised in any way, shape, or form. Various hardware has been deployed at proper sizing for customers and the equipment is stable without the need for a lot of custom configuration
The Check Point firewall is a reliable perimeter security product. Check Point gives me access to explore various security features in a single box (loaded with all features that an organization needs most). I can say I have been using it for one year and getting a grip on it and I will always try to implement it wherever it is required. When it comes to Check Point, there are great security features and a marvelous inbuilt design that caters to handling all threats, including zero-day attacks and perimeter security. I really like the user-friendly interface of the Smart Console dashboard and the maximum security is integrated.
Our business houses just over 100 staff, along with over 200 devices ranging from mobile to tablets, computers, laptops, and Servers. We use a Check Point 5100 cluster running R80.40 to protect our business from external threats. Our network is also extended to the likes of Microsoft Azure, Amazon AWS, and other 3rd parties utilizing secure VPN tunnels terminating on our Check Point 5100 cluster. Our business also offers the ability of hybrid working - which is only possible with our Check Point solution.
Check Point firewall is used as edge protection. Traffic to the internet and from the internet does go through the firewall where IPS, URL, and app policies are applied. Check Point was also used as an internal firewall to segment traffic between the data center and the user network. Basically, all traffic from any user will have to be inspected by an internal Check Point firewall before any server is accessed. Check Point is also used for PCI-DSS credit card checks within any email sent or received. This is effective in detecting credit card numbers within any email sent by a user in error and blocks that from being exposed.
I work for a systems integrator and have designed and deployed solutions over many years with Check Point components. Problems solved with Check Point NGFWs have included securing the edge, data center segregation, SWG replacement, Remote Access, and many others. I have designed and installed Check Point deployments from a single SMB appliance to multiple highly available chassis, running numerous virtual systems. Numerous different use cases include appliance form-factors, running modules, and licenses.
This is the perimeter firewall and manages all security facing towards the internet, It's a distributed solution composed of a Security Gateway and a Security Manager. It controls all the traffic from the LAN to the Internet and the VPN tunnels for connections with external partners. We control the traffic to the internet with blades as URL filtering to manage the bandwidth, limit the use of this resource, and apply the security policies as well as protect the LAN network against advanced threats from the internet to the servers and PCs.
We use the product to secure our network, using all Check Point has to offer, including multi-domain servers, centralized log servers, gateways on-premise, and VSX. It has improved a lot with the last versions making day-to-day operations very user-friendly. I have used almost all the blades Check Point has and it's incredible what a Next-Generation firewall is capable of, including VPN, IPS, monitoring, mobile access, compliance, and more. The reports of the Smart Event console are also very useful. It's good to have a view of what's going on in our network. Since Check Point has Linux working on them, it gives us plenty of tools to adapt to any specific need we have.
We use the solution as a frontend firewall in our headquarters and in our branches. We use packet inspection, the antispam feature, and the VPN. We have configured threat prevention and content awareness to improve security on incoming email and on web surfing from interlan networks wits SSL inspection. Mobile access through the VPN mobile client is also used from all outside workers and is fully integrated with our AD. We also use the solution to route traffic on internal networks and manage security through client and server networks.
What can you do about threats that get past simple packet inspection by a regular firewall? You could have a layer 3 firewall inspect the protocol and block known threats from certain URLs, however, what if it comes from a URL that has not been reported and is a socially engineered exploit designed to hijack your data? This is where a Layer 7 firewall will be able to inspect the application, known as payload inspection. While this is possible to do with a Layer 3 firewall, it can be difficult due to the number of protocol messages in Layer 7. You would need to create a signature for each application you wanted to protect; however, network signatures tend to block legitimate data and increase your MTTR (mean time to resolve an issue). Plus, having these signatures makes it hard to manage and keep up with by the IT staff. Relying on the power of AI and the cloud in order to leverage the Layer 7 firewall is key. The advantage of Layer 7 is its protocol awareness, which allows it to differentiate between different network traffic (application knowledge) and not just packets or flows that identify ports and IPs (Layer 3).
Working in an MSP environment, there are more than a hundred firewalls and we use Check Point NGFW firewall which is mainly implemented as perimeter security and internal segmentation firewall. Due to our requirements, we implement site-to-site VPN between clients and cloud providers (AWS/Goggle/Azure). The centralized managed infrastructure makes it simple for the IT staff to operate and monitor the firewalls. The Smart Console provides a single pane of glass that allows the IT staff to easily manage the environment and troubleshoot issues.
My primary use case of this solution is for the data center in the perimeter security. We configure all of our security features like anti-boot, antivirus, and filtering.
I use the NGFW as a Firewalling device, for VPN tunneling, and for virtual patching. My environment is a two-tier network environment. I also use the Check Point NGFW as an IPS.
We first deployed Check Point for our clients. Our first client wanted to deploy the security appliances in a cluster solution for their network infrastructure solution. The NGTW chosen was the 5800 series and it was deployed as a software solution on clients' servers. Everything is going smoothly and the client seems happy with our proposal.
Check Point is currently our perimeter firewall at various locations. We use their failover clustering with high availability option, which performs flawlessly. Upgrades are easy to perform and have always worked reliably for us. Technical support is always available to assist with these operations, which makes the process less stressful to the admins. We are also using their ISP Redundancy feature, which works as advertised - perfectly! It's easy to implement, especially with the awesome documentation from our engineer. We also use their Remote Access VPN offering and have really seen its value this past year, due to COVID-19. The VPN has been 100% rock solid, especially during the most critical times in our history.
We are a Critical Access hospital with close to 1,000 endpoints and hundreds of users. We currently have multiple ISPs coming into the hospital for internet redundancy. There are multiple buildings on our campus that are connected with copper and fiber. We have had clinics in multiple cities attached to our network at various times. We installed the Check Point NGFW in our environment to act as our main firewall and gateway. This allows us to keep several of the vendor devices (lab analyzers and other third-party equipment) segregated on different VLANs so they have no access to our production VLAN. This system is also our VPN concentrator for several site to site VPNs and remote software VPN connections.
We needed to replace our external firewall solution as we were having issues with the HTTPS inspection on our previous solution and the level of support being provided was terrible, leaving us with an issue that could not be fixed for over six months. We had already deployed a new internal firewall solution but needed something that would protect that from external factors. We also needed a new solution to replace our client VPN solution. The Check Point solution gave us that as one whole solution instead of having to manage multiple services.
We use our Check Point NGFW firewall mainly for perimeter security. Those firewalls are placed at many sites distributed over Europe. We love the firewall management and think it's still the golden standard for creating a rule base and we go more and more in the direction of identity bases user access to secure our environment. The other firewall blades, such as Anti-Bot, Application and URL-Filtering, and IPS, are used on all sites. It's easy to deploy, as the firewall is able, with the latest version, to learn from the traffic and adapt the IPS policy.
We use Check Point firewalls to prevent attacks against the data center servers by adding more layers of security, such as IPS, Data Leak Prevention. We have also used Check Point to implement security policies in layer 7 and applications as well as to configure the VPN for internal users of the organization.
I am using Check Point Next Generation.
We use the solution for a perimeter firewall, an internal segmentation firewall, and a routing device in our organization.
I have been designing, deploying, implementing, and operating Check Point's Security solutions including NGFWs and EndPoint security as well as Remote Access VPNs, Intrusion Prevention systems, URL filtering, user identity, UTMs, et cetera, for around 12 years. I have also used VSX and MDS/MDLS solutions. In my organisation I am using over 150 virtual and physical appliances and also MDS for virtualized/contanerized central configuration management and also central log management MDLS/MLM. We are using this not just for NGFW but also for other Perimeter security solutions.
It's our main firewall and the first line of protection from the outside! We use it to interconnect our remote locations (that use different vendors and equipment) and let the employees work remotely. We're a small site with 300 users and this equipment is more than enough for us. We use almost all the blades and the equipment has run smoothly for years. This NGFW monitors all the traffic outside of the main network, prevents malicious activities, and lets us easily manage network policies to shape our connections.
The primary use of the solution is as an enterprise perimeter firewall in our data centers. We also use software blades for IPS/IDS functions as well. We have a combination of enterprise-grade firewalls like the 15000 and16000 series as well as mid-size versions like the 5000 and 6000 series which are for specific segment isolation or other purposes. The software blades are running on HP servers. Management is done via 5150 appliances. 5000 and 6000 series appliances are primarily used for segment isolation while the larger appliances are used for perimeter security.
We use this solution for permissions regarding access ports and services. We also use Check Point Remote Access VPN as an endpoint VPN. We use it for site-to-site configuration. All of the traffic that comes through our sites passes through our firewall. Basically, everyone, including our staff and clients, passes through our firewall. In other words, we have thousands of users using this solution.
We use this solution for perimeter security and data center security.
We use Check Point NGFW for perimeter protection of our network from the internet. We also use it for threat protection at the network level and the endpoint level. We provide implementation, installation, and support services. We know about all types of firewalls, and we work with all types of installations. We usually use appliances, but in test environments, we use virtual appliances.
I use Check Point NGFW for controlling traffic and controlling access to the production server. It is a HA (high availability) environment. It is easy to use failover solutions. We use it on our disaster recovery (DR Site) and it runs smoothly.
We primarily use this product for cloud computing security. It is an integration platform for IPS and I also use it for performance monitoring. I also coach classes on the use of this firewall, which is installed on my personal laptop.
We use this solution for the VPN, from site-to-site and remote. We also use it for advanced IPS, IDS, malware protection, and the sandbox. The sandboxing functionality is one of the best features.
We use this product for providing perimeter security, as well as advanced threat protection capabilities to critical infrastructure. The solution is expected to deliver high-performance throughput for voluminous traffic continuously. We are using these gateways for multiple functionalities such as: * Perimeter Gateways * Anti - APT (Advanced Persistent Threat) * Anti Malware / Anti Virus * SSL Inspection * Network Intrusion Prevention System * Private Threat Cloud All of our solutions are expected to run in high availability and have good resiliency.
We use this solution for complete protection against advanced zero-day threats with Threat Emulation and Threat Extraction. We also use: * NSS Recommended IPS to proactively prevent intrusions * Antivirus to identify and block malware * Anti-bot to detect and prevent bot damage * Anti-Spam to protect an organization's messaging infrastructure * Application Control to prevent high-risk application use * URL Filtering to prevent access to websites hosting malware * Identity Awareness to define policies for user and groups * Unified Policy that covers all web, applications, users, and machines * Logging and Status for proactive data analysis
Our primary use case is as a perimeter firewall for main and DR sites for a financial institution. It secures Internet access for users through IPS/AV/Threat Emulation/Application control and URL filtering with HTTPS inspection and geolocation restrictions. It secures our email and MDM solutions. We also use it to create site-to-site VPNs with vendors. Remote access is achieved through the use of a secure workspace and SSL network extender. Securing and inspecting HTTP traffic to our web servers is another important task. It secures several DMZs and segregates them from the rest of the network. We use all of the security features available.
I'm a consultant at a Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I have deployed standalone, cluster, and two-layered firewalls.
We have a pretty small office and therefore, a small network environment, and the SMB appliances from Check Point were a perfect fit and exactly what we were looking for in order to improve our overall security posture in the office. It was critical for us to be able to secure our network, including intrusion detection and prevention along with threat emulation and extraction for zero-day threat help, and Check Point fit perfectly. After implementing the solution, we were able to get through a third-party penetration test of our network without issue.
Our branch offices and customer sites require Internet access for the on-site staff and remote access capabilities for after-hours and remote support. The Check Point firewalls allow us to provide site-to-site VPN, client VPN, web/app filtering, and IPS functionalities. Client VPN is leveraged by site staff due to the majority of our sites requiring 24-hour support and also allows centralized teams to remotely assist with multiple sites globally. We also use these at locations to provide security when our stand-alone network requires connectivity to the customer's network.
The role NGFW plays is to protect the organization against Layer 7 network attacks. The solution has helped us to guard our perimeter security on a wider level. This is not like plain vanilla firewall. We have got a wider visibility with the help of this next-generation firewall; it shows us the traffic flowing across the network and based upon that, we have made the modifications required to restrict access. Also, the active cluster module has helped us to balance the load during peak hours. Since moving to the active-active module, we have got the much-needed breathing space.
The primary use is to protect the organization from any kind of attack. It is able to isolate, secure, and control every device on the network at all times. Solutions should have the ability to block infected devices from accessing corporate data and assets. It provides access to the Internet for corporate resources in a secure manner. Our resources are used to host applications and services that are accessible to end-users over the Internet. It is used to provide required/limited access for third parties who want to connect to our corporate network. Access is granted based on application type and should be independent of port or protocol. It provides next-generation protection including IPS/Web Filtering/SSL decryption and more. It offers centralized policy management capabilities for all firewalls.
Our primary use case is to secure the perimeter and users in our network. We use IPS/IDS, deep packet inspection, and VPN.
In my company, we use the Check Point NG Firewall solution to secure the perimeter and user network. We use IPS/IDS, deep packet inspection, and VPN. We have implemented routing rules based on the destination of the traffic, and the performance of the global solution is satisfactory. We use the solution, too, as the firewall in a core node, which is very important to the business. It secures the network equipment and service integrity. We are delighted with the powerful management console and diagnostic tools.
Nowadays, there are many threats and it's necessary to have an automatic process to defend your organization. The Check Point NGFW is a good solution for this use case.
We support various clients in the government sector in Mexico. We provide different solutions in terms of network security, data security, and perimeter security. The NGFM Firewall is available locally and different offices and/or institutions of the government sector pass through a more secure and controlled infrastructure. This type of infrastructure has different zones or areas that are managed and keeping them centralized has helped us to maintain and control them. In addition, we are generating fast and safe solutions for our users on each site.
We have deployed Check Point firewalls for perimeter security and also for filtering East-West traffic. Check Point helps in improving perimeter security along with giving insights into different kinds of traffic and attacks. Isolation between different tiers of APPs is critical for us and Check Point is utilized for handling high traffic volumes of East-West traffic. We are leveraging the VPN module on the perimeter firewall for users to access the VPNs. VPN authentication is integrated with RSA for multi-factor authentication.
We were looking for an easy, centrally-managed firewall infrastructure as we were using a standalone solution that was difficult to operate and maintain because it was composed of several different systems. We needed a solution that had support for virtual systems, and we needed such flexibility without increasing the cost by too much. On the other hand, comparing within the sector, Check Point NGFW has a good stack of security mechanisms (modules, aka blades in CKP terminology) that are easy to implement and use.
We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers. Currently, we are using the R80.20 firmware version and we have a pretty simple design. Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.
The purpose of using the firewall is to protect the users from the external network, internet. Apart from that, we have set up IPsec tunnels between two different sites, and for internal usage, between two different zones, we use these firewalls as well. Our environment consists of a 3-tier architecture, which is recommended by Check Point. We use the central management system to manage our 3-tier architecture, and we use the Smart Console as well.
We use this firewall to protect the internal network and to set up the IPSec standard from one location to another.
We use this solution as a layer 3/4 firewall deploying access rules in our DMZ. We have more than six different centers with different service layers, a core of up to 500Gb per site, and other service centers providing security for all inbound and outbound connections. VSX gives us the capacity to consolidate hardware in fewer devices, reducing the OPEX, and creating different VFWs to provide service to different environments or services. Layer 7 features allow us to upgrade our security services. Activating the required features only requires upgrading the license.
In today's world, we can't completely rely on traditional signature-based devices, as technology involving cyberattacks is becoming more sophisticated. We require an all-in-one solution that can defend against newly-created attacks, necessitating the usage of NGFW firewalls. This is where Check Point comes into the picture. Our environment contains multiple roaming users, where we have to extend trust beyond the organizational network. Not only is there east-west traffic to deal with, but a large volume of north-south traffic, as well. We are required to monitor all of the traffic, which includes many branch offices connected centrally. Monitoring Data via DLP in such a scenario, we require a single solution, which is nothing but Checkpoint.
I work as an internal network team member. We protect the company environment from outside threats, outside viruses, and ransomware attacks. It is kind of an IT administrator job. They are protecting internal security as well as giving us security from the outside world or public environment.
We use firewalls to protect our private environment from the public environment. My IT group is in charge of protecting the environment and maintaining safe usage of the internet. This product gives us a better, safer solution for the users within our company.
The main use case is Firewall provisioning and integration with Tufin and Skybox. Also, we focus on firewall compliance, rule review, VPN configuration, and network troubleshooting.
We use Check Point firewalls to secure our internal network from the outside world and to provide a good, comfortable, and secure environment for our employees. We have various models from the R80 series, such as the R80.10 and the R80.30.
We have two clusters. We are using them as both perimeter firewalls and data center firewalls.
We use the solution to protect our organization and workers from the outside Internet or any untrusted network. We have the three-tier architecture of Check Point. We use its consoles, central management system, and firewall device for managing it. This three-tier architecture is recommended by the Check Point Community.
We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world. I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances.
Our primary use cases for Check Point NGFW are for perimeter security and content filtering for browsing behavior.
We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.