Check Point Antivirus Overview

What is Check Point Antivirus?

Antivirus uses real-time virus signatures and anomaly-based protections from ThreatCloud™, extensive threat intelligence to proactively stop threats and manage security services to monitor your network for rapid incident response and fast attack resolution. Learn More about Antivirus Software.

Check Point Antivirus is also known as Check Point Antivirus Software Blade.

Check Point Antivirus Buyer's Guide

Download the Check Point Antivirus Buyer's Guide including reviews and more. Updated: June 2021

Check Point Antivirus Customers

Morton Salt, Medical Advocacy and Outreach, BH Telecom, Lightbeam Health Solutions, X by Orange, Cadence, Nihondentsu, Datastream Connexion, Good Sam, Omnyway, FIASA, Pacific Life, Banco del Pacifico, Control Southern, Xero, Centrify

Check Point Antivirus Video

Pricing Advice

What users are saying about Check Point Antivirus pricing:
  • "The pricing is very expensive. You need to buy the appliance and subscription as well."
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
JalalAtik
Owner and CEO at A.T.I.K. Maroc
Real User
All-in-one solution that offers the ability for users to have a different interface port per user group

What is our primary use case?

The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind. There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.

Pros and Cons

  • "They have pretty much everything you can ask for as far as features are concerned. That is because they know their market. They are focused on what they do and they do only that."
  • "The pricing is really extremely high in comparison to the rest of the market."

What other advice do I have?

Advice that I would give to others who are looking to implement Check Point Antivirus in their organization is the same advice I would give to someone considering any solution. Before you invest any money in any product — it could be Check Point, it could be Fortinet — you have to know what you are trying to achieve. If you don't know what you are trying to achieve, there is no purpose in buying anything. It will not serve a purpose. First, define your parameters, understand the risk that you are up against without the solution and what the benefits are if you buy. Then after you think about…
ITCS user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Stops viruses from crossing the perimeter firewall to the inside

What is our primary use case?

The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.

Pros and Cons

  • "The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing."
  • "Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails."

What other advice do I have?

If you have Check Point firewalls on your infrastructure, this is the best solution to deploy because it's just to enable a Blade. If you don't have Check Point firewalls, you should also consider other solutions. If you already have Check Point firewalls, the traffic is already going through them so it's just a matter of enabling the Blade. Try to run through the manuals to see the signatures and how to deploy and to create a profile. You can install the SmartConsole and run the demo mode and you can do some simulations without having to deploy a firewall. It's also good that you can do the…
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
513,091 professionals have used our research since 2012.
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Regularly updated and has good event visibility and logging

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Antivirus software blade is one of the numerous blades activated on… more »

Pros and Cons

  • "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
LA
Network, Systems and Security Engineer at SOLTEL Group
Real User
Top 5Leaderboard
Easy to scale, heuristic scanning protects against previously unknown threats, and the support is good

What is our primary use case?

We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions. It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software. Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.

Pros and Cons

  • "Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses."
  • "It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks."
PP
ciso at SDIS49
Real User
Top 5Leaderboard
Provides good security and integrates well with other products

What is our primary use case?

We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.

Pros and Cons

  • "Check Point integrates well with other security products."
  • "The initial setup and configuration should be simplified."

What other advice do I have?

This is a good product and one that I recommend. I would rate this solution a nine out of ten.
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.