Check Point IPS Primary Use Case

reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
We use Check Point IPS to protect our infrastructure against threats. It internalizes different attack buttons. We started by deploying it only on the on-prem firewalls, but now we are also rolling out to the internal firewalls, the ones that segregate environments, the production, and the corporate environment. View full review »
Kristaps Krauklis
IT Department manager at AS Attīstības finanšu institūcija Altum
We are using Check Point IPS for securing our internal networks and our website, as well as all of the traffic that goes through us. The traffic is analyzed by the IPS, which checks for things like malicious files and different attack patterns. We are using the virtualized version. View full review »
Oleg P.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Our company works in developing and delivering online gambling platforms. The Check Point NGFWs are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Clusters serve as the firewalls for both inter-VLAN and external traffic. We have the Intrusion Prevention System (IPS) blade activated on both Check Point HA Clusters as the counter-measure against advanced threats and malware. The IPS blade mostly used for ingress traffic from the Internet to the DMZ VLAN. View full review »
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: August 2020.
442,283 professionals have used our research since 2012.
Kirtikumar Patel
Network Engineer at LTTS
I work in MNC company and we have 6 GEO locations in India and all of our locations are using Check Point as a perimeter firewall. I sit in our HO Office and I am maintaining all the location firewalls with my team, except for 1 location. We regularly monitor the security alerts on our perimeter and based on that we will align our location IT to check and update us. IPS is our core blade for network security, it is provide the details that some suspicious activities happen on our network as per the IPS signature database, and based on that we will work on that. As our primary use case with IPS blade we are daily receiving non-compliant IKE alert, and we know if we prevented it then what impact will happen, our all site to site tunnel will stop working which is running with noncompliant IKE and we are not forcing our client to update that noncompliant IKE protocol. View full review »
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: August 2020.
442,283 professionals have used our research since 2012.