What is our primary use case?
We use the solution for network security, perimeter security, DMZ, antibot, antivirus, endpoint protection, email security, sandblast, and DLP. The environment is a multi-environment and consists of multiple networks, segmented and managed by a management server. These firewalls protect the network, external and internal.
We are also protecting several customers and it allows remote access connection from anywhere in a secure way.
There are also site-to-site VPNs with different customers, vendors, and cloud providers, using the highest security encryption algorithms.
How has it helped my organization?
The organization is more secure. These firewalls work as expected. We have a perimeter and network segmentation well defined and firewall features and blades like IPS, Identity awareness, antibot, antivirus, threat prevention, endpoint security, and DLP, all allow the organization to have most of the security components centralized which allows for easier maintenance and monitoring.
In relation to the monitoring, Check Point has tools that allow the administrator to track the traffic, and identify threats, attacks, and also check the forensics to understand what happened in case of a breach and ensure it won't happen again.
What is most valuable?
The most valuable elements include:
Smart View Tracker: To check the traffic logs easily. This is the best logging tool for me so far. You can identify almost everything from the logs, using a smart view tracker.
Smart Dashboard: allows for rule creation and administration and management and is user-friendly. The administration allows you to copy and paste rules, move the order, and create objects, pretty easily. It is very handy.
CPUSE: A Smart way to upgrade firewall software versions. You can easily verify if you can upgrade to the desired version, download the right package and upgrade, and also check the status of the upgrade. It's a great tool.
What needs improvement?
Error logs can be more specific. Sometimes the error shows only a general error and the solution could be hard to find or difficult to apply.
Documentation can be improved. It has been improved, however, when you search for errors, in relation to documentation and how to solve it, sometimes it is not that simple to find the right solution. Troubleshooting errors could be sometimes difficult and some tools are only available for the Check Point support team.
The price is also a factor to take into account. Other competitors offer low prices in relation to Check Point and the executive team may opt for the cheapest vendor (if you have to compare to another good one yet note a cheaper price).
For how long have I used the solution?
I've used the solution for ten years.
What do I think about the scalability of the solution?
The solution offers good scalability.
How are customer service and support?
The solution offers good customer service and good support.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have been using Check Point since the beginning.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
The solution is super stable.
What's my experience with pricing, setup cost, and licensing?
The pricing could be better, however, the vendor is excellent and I strongly recommend it.
Which other solutions did I evaluate?
I did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.