Check Point Security Management Review

Good access control, security control, and threat prevention, but needs better support and a workflow for user authorization


What is our primary use case?

We use it for both perimeter and internal defense.

What is most valuable?

It is good when it comes to access control, which is the basic feature that we use in a firewall appliance or solution. Check Point is effective when it comes to security control and threat prevention.

What needs improvement?

Support is the main area that they need to improve. Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.

I would like a feature where there is a workflow to provide authorization to some users before they're able to create and apply rules. Such a feature should be integrated with the management. It should not be in the box that comes with it.

For how long have I used the solution?

I have been working on the protection network since 2014. It has been around seven years.

What do I think about the stability of the solution?

So far, it has been stable, but stability also depends on your design and deployment. You might have a performance issue, especially when you have to deal with a lot of traffic. You also need to factor in maintenance in terms of the upgrades, patches, and hotfixes that you need to do regularly. When you're able to do that and take care of the maintenance, you'll have stability.

What do I think about the scalability of the solution?

Scalability depends on your design. You have to properly scope your environment to know the amount of traffic that is expected to go through, pass, or transmit through the firewall. After you have a proper scope, you won't have any problems. Otherwise, you'll definitely be experiencing issues.

How are customer service and technical support?

Our support experience is not very smooth. We are based in Africa, and we don't know whether it is because of our region.

How was the initial setup?

As compared to other security and firewall solutions, its deployment is not that easy. The deployment duration depends on your project plan. It also depends on whether you are working just on the deployment, and there are no distractions.

What about the implementation team?

In terms of those who manage the rules and administer the system, we have about ten people. They are administrators, and they create rules, manage the system, and provide support.

Which other solutions did I evaluate?

I wasn't a part of the team that did the evaluation.

What other advice do I have?

I would advise others to properly apply good design concepts by engaging professionals. They should properly scope their environment to ensure that they are deploying the solution to optimized standards. They should also ensure that they train their personnel to be able to handle the first level and even second level support when it comes to the management of Check Point.

I would rate Check Point Security Management a seven out of ten considering the skills that are required and the ease of use and management.

Which deployment model are you using for this solution?

On-premises
**Disclosure: I am a real user, and this review is based on my own experience and opinions.
More Check Point Security Management reviews from users
...who work at a Financial Services Firm
...who compared it with Fortinet FortiAnalyzer
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2021.
534,299 professionals have used our research since 2012.
Add a Comment
ITCS user
Guest