Assistant Manager IT Projects at Mustafa Sultan Office Technology Co. LLC
Real User
Sep 2, 2019
We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is. The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.
We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network.
We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers. This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.
Learn what your peers think about Check Point Cloud Firewall (formerly CloudGuard Network Security). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
Network and Security Manager at a financial services firm with 1,001-5,000 employees
Real User
Aug 4, 2019
This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution.
Check Point Cloud Firewall delivers advanced threat prevention and administration ease with centralized management of hybrid clouds. It offers seamless cloud platform integration, maintaining consistent security policies and enhancing efficiency.Check Point Cloud Firewall is designed for comprehensive cloud security, ensuring perimeter protection, traffic inspection, and threat prevention. It is often used for safeguarding workloads and applications in public cloud settings like AWS and...
We use this solution as our perimeter firewall.
We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is. The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.
We primarily use the solution as firewall security for our clients.
We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network.
Our primary use case of this solution is for security.
We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers. This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.
This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution.
We use this solution to secure networks. We block unwanted malware.