What is our primary use case?
We use it to manage our entire network and protect network traffic in terms of files that go out and come in. This protects our network between any platform we access or interactions between our clients and us. Also, it helps to monitor and block malicious applications, then it prevents these sites from accessing our stuff.
We use it for the endpoints and all the additional points which access the network in the organization. It protects everything across the board, from the server to the many other devices, like your phones and laptops.
How has it helped my organization?
In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.
What is most valuable?
The sandboxing feature: I like the entire process. It's one thing for it to detect, but another thing to have a remediation plan. It actually extracts out what we need to make it a clean file.
What needs improvement?
There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc.
For how long have I used the solution?
I have been using it since sometime from the beginning of last year.
What do I think about the stability of the solution?
It works just fine. I haven't experienced any issues.
What do I think about the scalability of the solution?
It scales well. It accommodates all the endpoints that we have in our organization. As we grow, we do plan to increase usage.
We use it in our entire organization. Every staff person and device has access to the solution. We have approximately 250 endpoints.
We have 10 IT managers and systems engineers directly working on it. I also work with the solution as a business analyst/developer.
How are customer service and technical support?
The technical support is good. It is a straightforward solution. We have not really needed to call for anything because they train you on how to use this solution. You already have the IPS working and know how that works. It's not something that is complex.
Which solution did I use previously and why did I switch?
We were previously using Sophos. We switched to Check Point because the pricing was much cheaper (by 25 percent).
How was the initial setup?
The initial setup was straightforward. You're required to have some administrative training on how to use the solution. The deployment took between three to six months.
What about the implementation team?
We worked directly with the vendor. The vendor had a partner in my region. Therefore, we worked directly with the partner, who was also working with Check Point. So far, the experience has been great. They were efficient. We have been able to achieve the reason why we set up and procured this solution.
What was our ROI?
We have seen ROI. It reduces malicious attacks and restricts users from accessing sites via our network.
What's my experience with pricing, setup cost, and licensing?
As we grow, we've been given room to add additional licenses in terms of all our endpoints.
In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth.
The solution is too pricey.
Which other solutions did I evaluate?
We only evaluated Check Point and Sophos. There are only two really good cybersecurity solutions locally. You are either doing Sophos or Check Point. It is one or the other.
What other advice do I have?
It is a great fit for any organization. I would rate the solution a 10 out of 10.
Which deployment model are you using for this solution?