Check Point NGFW Review

Easy-to-use console, good logging, effective traffic and access control features, responsive support


What is our primary use case?

I use Check Point NGFW for controlling traffic and controlling access to the production server. It is a HA (high availability) environment. It is easy to use failover solutions.

We use it on our disaster recovery (DR Site) and it runs smoothly.

How has it helped my organization?

In the office, Check Point Infinity is the only fully consolidated cybersecurity architecture that protects your business and IT infrastructure.

Integrating the most advanced threat prevention and consolidated management, the security gateway appliance is designed to prevent any cyber attack, reduce complexity, and lower costs.

Check Point gateways provide superior security beyond any Next-Generation Firewall (NGFW).

Best designed for network protection, these gateways are the best at preventing the fifth generation of cyber attacks.

Overall, for us, it improves the private cloud security and helps to prevent the spread of threats while consolidating visibility and management across our physical and virtual networks.

What is most valuable?

The most valuable feature is the next-generation firewall (NGFW) protection.

Check Point has long been a leader in the firewall market. It offers Quantum Security Gateways for a wide range of use cases and CloudGuard FWaaS and cloud security products too. NSS Labs scored Check Point just behind Palo Alto in security effectiveness and ahead of Palo Alto in TCO. Check Point’s management features are among the best in the business, but SD-WAN capabilities are lagging.

A firewall rule is the same on all systems, and I am very happy with the correlation and the display of the rules.

From the logs, you can trace back to the rule with a click, which makes it easy to investigate cases. It is also easy to search the log.

What needs improvement?

They have few predefined reports and it would be nice to increase them since the logs are excellent.

They should be quicker to release fixes for known vulnerabilities, including those related to Microsoft products.

If you make a mistake when creating rules, it is time-consuming to fix them. However, there is no problem with traffic processing. 

Sometimes you are forced to interact on several different levels. On the one hand, you put the rules in, and on the other, you put in the route. 

For how long have I used the solution?

I have been using Check Point NGFW for between five and six years.

How are customer service and technical support?

They have a good support team that is fast to respond. However, there are open cases that should be resolved in a more timely fashion.

Which solution did I use previously and why did I switch?

We used another solution prior to this one, but the updates were too slow and it was harder to monitor the log.

How was the initial setup?

The initial setup is very hard.

What about the implementation team?

The vendor implemented this product for us.

What was our ROI?

This product is a good investment and I expect a full return in approximately three years.

What's my experience with pricing, setup cost, and licensing?

The price of the appliance should be decreased.

Which other solutions did I evaluate?

 I evaluated several other solutions and compared them before choosing Check Point.

What other advice do I have?

This is a product that I recommend.

Which deployment model are you using for this solution?

On-premises
**Disclosure: I am a real user, and this review is based on my own experience and opinions.
More Check Point NGFW reviews from users
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
522,946 professionals have used our research since 2012.
Add a Comment
ITCS user
Guest