Optical Fiber Splicer at a tech company with 51-200 employees
Real User
Top 10
Dec 3, 2025
I am currently working with Fortinet Firewall, Fortinet Switch, Fortinet Authenticator, FortiNet Net, Fortinet Authenticator and FortiGate Analyzer. We have both integrator and implementation capabilities similar to Sophos, Palo Alto, and Check Point, depending on customer requirements. Check Point Quantum Force is used for internal security. We have a customer whose requirement is for both external and internal security. We use Check Point Quantum Force for internal security and Palo Alto for external security, with both in HA mode. For central management, we are using Panorama in Palo Alto and Check Point Quantum Force manager. Across all 50 to 60 locations, we are using a Palo Alto lower version.
The main use case for Check Point Quantum Force is to protect us from the outside world. Check Point Quantum Force is preferable for most of our clients in the perimeter. That means it will be the gateway for our network to get into the internal network. The use case for this solution is the perimeter network. Check Point Quantum Force uses modern AI-based threat prevention techniques. It uses AI engines such as CloudGuard or ThreatCloud. It frequently updates and potentially detects newer and known zero-day threats. As a perimeter network, there are many services that are open for outside clients, the public service. The only way to prevent that perimeter DMZ network is a perimeter gateway, which means Check Point Quantum Force. Check Point Quantum Force helps us to prevent our DMZ networks that are accessible publicly. It helps us to prevent our perimeter networks. It is compact and efficient hardware, consisting of one unit or two rack units, so its form factor is good. Its power efficiency is good. It has very high block rates with a prevention rate of about 99%.
Find out what your peers are saying about Check Point Software Technologies, Palo Alto Networks, Zscaler and others in Firewalls. Updated: January 2026.
Firewalls serve as a crucial line of defense against cyber threats by monitoring and controlling incoming and outgoing network traffic.
Firewalls analyze network traffic based on pre-defined security rules to block unauthorized access, providing a barrier between trusted internal networks and untrusted external networks. They are essential for organizations seeking to protect their digital assets.
What are some critical features of Firewalls?
Intrusion Detection: Monitors...
I am currently working with Fortinet Firewall, Fortinet Switch, Fortinet Authenticator, FortiNet Net, Fortinet Authenticator and FortiGate Analyzer. We have both integrator and implementation capabilities similar to Sophos, Palo Alto, and Check Point, depending on customer requirements. Check Point Quantum Force is used for internal security. We have a customer whose requirement is for both external and internal security. We use Check Point Quantum Force for internal security and Palo Alto for external security, with both in HA mode. For central management, we are using Panorama in Palo Alto and Check Point Quantum Force manager. Across all 50 to 60 locations, we are using a Palo Alto lower version.
The main use case for Check Point Quantum Force is to protect us from the outside world. Check Point Quantum Force is preferable for most of our clients in the perimeter. That means it will be the gateway for our network to get into the internal network. The use case for this solution is the perimeter network. Check Point Quantum Force uses modern AI-based threat prevention techniques. It uses AI engines such as CloudGuard or ThreatCloud. It frequently updates and potentially detects newer and known zero-day threats. As a perimeter network, there are many services that are open for outside clients, the public service. The only way to prevent that perimeter DMZ network is a perimeter gateway, which means Check Point Quantum Force. Check Point Quantum Force helps us to prevent our DMZ networks that are accessible publicly. It helps us to prevent our perimeter networks. It is compact and efficient hardware, consisting of one unit or two rack units, so its form factor is good. Its power efficiency is good. It has very high block rates with a prevention rate of about 99%.