What is our primary use case?
We use this solution for our perimeter firewall to protect our web applications, systems, and network. We are running our complete business with Check Point.
The complete traffic is managed by Check Point. The Check Point threat emulation blade is enabled to protect zero-day attacks and it will detect and prevent attachments and other payloads from this type of attack.
How has it helped my organization?
We have been running Check Point for the last ten years and it protected our network, systems, and applications against the latest attack. Our organization is running 500 applications that are being protected.
The next-generation firewall will manage all of the traffic and prevent the latest & advanced threats from attackers. The latest operating systems R 80.20 is wonderfully designed and allows customers to manage everything with a single console.
What is most valuable?
The most valuable feature is that we are protected against zero-day threats.
Everything can be managed from a single console.
What needs improvement?
We would like to see the following improvements:
- Multiple ISP redundancy.
- CPU utilization.
- VPN traffic.
- HA concept, where if we apply the policy in the primary appliance that should be applied to HA appliance automatically.
- The number of bugs has to be reduced.
- The number of false positives should be reduced.
- Threat emulation has to be improved.
- Reporting has to be improved.
For how long have I used the solution?
I have been using Check Point Next Generation Firewall for ten years.
How are customer service and technical support?
We are happy with Check Point technology and support.
What other advice do I have?
Both IN and OUT traffic is managed by Check Point. We are happy with Check Point technology including the protection, management, and the ability to secure the enterprise network against advanced threats.
Which deployment model are you using for this solution?