Check Point NGFW Implementation Team
BF
reviewer1718715
Network Engineer II at Baptist Health
We used vendor support and account teams and in-house technical engineering.
View full review »AS
reviewer1625583
Works at a financial services firm with 10,001+ employees
We implemented it through an in-house team.
View full review »The deployment took approximately five hours. The process can be executed in various methods. I typically perform a remote login from the console. The deployment involves three main steps: IP configuration, security configuration, and DNS setup, including any necessary DNS protection configurations.
View full review »Buyer's Guide
Check Point NGFW
April 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,246 professionals have used our research since 2012.
The implementation was done by a very qualified vendor team.
View full review »We implement through a vendor team. The vendor team is very competent and has consistently displayed their expertise in the technology.
View full review »The implementation process is generally straightforward and basic, taking around one to one and a half hours. However, if there's a need for the creation of numerous VLANs and policies, it might extend over several days.
View full review »MK
Mithilesh_Kumar
Technical Architect and consultant at VirginAustralia
I have hands-on experience working in various environments, including on-premises, private clouds, hybrid setups that combine both private and public clouds (e.g., AWS, Google Cloud, Oracle Cloud), and purely public cloud deployments. While the technical interfaces and options may differ slightly between these environments, the core concepts, such as Security Event and Management (SEM), remain consistent. For instance, the Virtual Private Cloud (VPC) configurations in Google Cloud are similar to those in AWS. Network components like instances and Access Control Lists (ACLs) share common principles across platforms. The key to successfully implementing it lies in understanding the specific needs of each client's business and aligning our solutions accordingly. We can leverage technology and services to meet their requirements effectively. It's worth emphasizing that the adaptability of our approach is central to achieving our clients' objectives. When starting a project, we typically initiate a POC and conduct thorough pre-checks to assess the network's specific needs. In cases where clients want to transition from legacy firewalls like Cisco ASA or Palo Alto to modern Next-Generation Firewalls like Check Point Firewall, we carefully examine their existing configurations. This allows us to manipulate and adapt the configurations to suit Check Point's requirements. The timeline for these processes can vary. For entirely new environments, which involve documentation, design, and diagram creation, it may take anywhere from 15 days to one month at most.
The expertise of the vendor team is excellent; I'd rate their services nine out of ten.
View full review »We set up the solution mostly in-house. However, we were experienced with Check Point installs.
View full review »We handled the setup initially in-house.
View full review »I implemented this myself.
View full review »The deployment process took approximately a week and a half, and about half of the challenges we faced were related to the physical connectivity issues on our end. Despite those hurdles, the deployment timeline remained relatively swift. One critical aspect for anyone planning to deploy this solution is to thoroughly understand where it fits within the network architecture and how it should be physically connected. This is especially important when implementing clustering, as the physical connectivity can become intricate. It's essential to consider high availability and compatibility with other devices it will connect to, such as core switches or perimeter routers. Ensuring that these devices support the desired failover and reliability modes is key to avoiding complications. The duration of the deployment also depends on the expertise of the person responsible for it. In our case, we opted for professional services, which included on-site configuration support. If the person handling the deployment is familiar with the surrounding devices and network environment, one individual may suffice. If there are connections to devices from different vendors, and the configuring expert lacks expertise in those areas, I would advise involving additional personnel with the relevant expertise to ensure a smooth deployment process.
We implemented the solution through our in-house engineer.
View full review »NS
reviewer1776732
Senior Solutions Architect at Maersk
We had a vendor assist us.
View full review »JR
reviewer1680342
Systems Architect at PHARMPIX CORP
The implementation was performed by a vendor team in combination with our in-house security team.
View full review »SF
Sandun Fernando
Network Administrator at University of Kelaniya
A vendor team implemented this. They gave us in-house training for our staff. They are experts in Check Point and taught us well.
View full review »The deployment process can be rated at about six in terms of complexity. Several factors influence this complexity, but getting the infrastructure ready is often the most challenging aspect. To successfully deploy, you need to account for downtime, ensure proper backups are in place, and ideally test it in a sandbox environment before going live. After deployment, thorough checks and adjustments are necessary. It typically requires at least two days of parallel operation, where both the new and old equipment run simultaneously. In an environment with no existing infrastructure to replace, the process is generally smoother. Deployment typically involves a team of 2 or 3 people working full-time for 4 to 5 days, equivalent to nine hours a day. Maintenance is handled by a networking team, which includes a Network Operations Center. The team consists of approximately eleven people managing various network components, including L1, L2, and L3 devices.
JD
reviewer1773654
Ingeniero de Infraestructura at E-Global S.A.
A vendor team helped us, and the migration was smooth. The Check Point engineers who worked for our partner were well trained to handle the implementation.
View full review »NT
reviewer1721709
TitleNetwork Manager at Destinology
We implemented it through a vendor team. Their level of expertise ranged as we moved through three separate technicians during our installation which was problematic. I wouldn't use this particular vendor again. That said, this was nothing against Check Point.
View full review »JV
reviewer1724343
Principal Associate at Eurofins
We had help through a vendor and the experience was great.
View full review »AK
Amit Kuhar
Network Security Consultant at Atos Syntel
We are an IBM OEM company who received installation support from that vendor. They provided all the network connectivity.
For our implementation, we:
- Started with an initial diagram of the configurations and what we want to see after the installation.
- Segregated the SonicWall and Check Point tools for the migration since we used automation.
- Checked the mode of installation. We went with transparent mode.
- Collected the IPs for the firewall. It required multiple IPs because with we have cluster nodes.
- Assessed the feasibility of Check Point in our environment.
For our strategy, we looked at:
- How many users are in all our offices? For example, is it a small office, mid-size office, or data center?
- Using high-end versus lower-end devices, e.g., lower-end devices means a smaller price tag.
A smaller office of less than 500 people would get a 4000 Series. Whereas, a larger office would get a 5600 or 7000 Series. We have to be focused on the natural topology.
View full review »LS
Lucas Sousa
Network Administrator at Bodiva
We've had positive experiences with the deployments, and we've recommended it in several instances. Currently, we have implemented four Check Point Firewalls. Our initial deployment at the primary site took approximately a week to set up. After fine-tuning and making necessary adjustments, the total time for implementation was roughly two weeks. The main office at our headquarters had a similar timeline, as the tuning process does require a significant amount of time and effort.
View full review »SG
reviewer2178546
Network security architect at a energy/utilities company with 10,001+ employees
We have used help from a third-party company.
View full review »JJ
José Javier Dominguez Reina
Project Manager at Junta de Andalucia
It was implemented through a CheckPoint partner who demonstrated great experience in migration.
View full review »SR
Sunil Redekar
Security Engineer at Hitachi Systems
We support companies locally and remotely. Since the lockdown, we have been supporting companies only in a remote fashion.
We have to first make a plan of action, then verify that it meets Check Point's requirements. Then, we will raise a case with the Check Point desk. We verify with them if there are any changes that they need us to do. After that, we will go for deployment. Check Point engineering will also help if there are issues with the deployment.
We implemented the solution through a vendor team; they had well-trained technicians.
View full review »TD
Paolo Barbato
Network and Security Administrator at CNR-ISTP - Consorzio RFX in Padua at Politecnico di Milano
We implemented it with a third party and in-house. The support company that helped in Italy is fantastic.
View full review »We implemented it through a vendor. There was not a high level of expertise, however, I took a course with Check Point and that was very clear and now I'm very expert on the Check Point world.
View full review »PD
reviewer1717920
Cyber Security Consultant at Capgemini
We can implement it by ourselves.
View full review »TM
reviewer1718682
Senior Information Security Specialist at a tech vendor with 10,001+ employees
We handled the setup in-house. We have enough knowledge to do that. Our expertise is CCSM level.
View full review »BZ
reviewer1692960
IT System Operations Manager at Hamamatsu Photonics KK
We implemented through Check Point directly.
View full review »We implemented via a vendor and I have to say their level of expertise was brilliant. Every question we threw at them, they were able to provide an answer to.
View full review »Was implemented using a third-party vendor.
View full review »KP
Kirtikumar Patel
Network Engineer at LTTS
In-house team and technical support team.
View full review »We deployed the solution using Check Point's PS Support. Their team is highly experienced and professional.
View full review »I am part of the vendor team. We do a good job implementing it, although sometimes it takes too much time to deploy a product.
View full review »When deploying on AWS cloud, I typically opt for CloudFormation templates to facilitate the setup of Check Point. This approach offers the advantages of infrastructure as code. When it comes to on-premises deployments, the process is manual and involves tasks such as physical cable connections, configuring interfaces, setting up routes, and defining network policies. For a typical mid-sized project, a single person is usually sufficient for the cloud deployment, taking no more than two hours if the implementation plan is well-defined and the design is in place.
View full review »We implemented the solution through a vendor team. The score I'd give for their expertise is seven out of ten.
View full review »The deployment process begins with configuring the firewall's IP and other settings. Once this initial configuration is complete, we proceed to the AI portal. In the AI portal, the first step is to configure the interfaces. After configuring the interfaces, we proceed to install the created interface. Next, we move on to the SmartConsole. To access the SmartConsole, we download it from the app portal. Once the SmartConsole is installed, we can easily create rules for logging purposes, manage objects, configure networking, and VPN, and other technical tasks from the SmartConsole. Routing and related tasks are typically handled in the data portal. One individual is enough for the deployment. The duration of the setup process varies depending on factors such as the complexity of the customer's environment and the site architecture. For instance, in a relatively simple scenario with just two VLANs and a couple of VPNs, the configuration could be completed within a few working days. Maintenance is essential, with upgrades and patch updates being mandatory at least once every six months. This ensures the system remains up-to-date and secure.
AY
reviewer1768698
Jr. ISO at BancNet, Inc.
We did the deployment in-house and with a vendor team. The level of expertise was a 10/10.
View full review »BW
reviewer1718706
Consultant at work@lim.it Systemhaus
We have implemented it completely in-house.
View full review »We used a vendor team. Their level of expertise was acceptable.
View full review »S
reviewer1776717
Network Security Engineer at Fujairah Port
We implemented through a vendor team and I would rate them at a 10 out of 10.
View full review »VJ
reviewer1686129
Senior infrastructure technical lead at Westpac Bank
We had vendor involvement.
View full review »VN
reviewer1602702
TitleManager - Datacenter IT at a manufacturing company with 10,001+ employees
We had an in-house team for deployment with active support from Check Point.
View full review »CB
Charanjit Bhatia
AGM Cyber Security CoE at Bata Group
Yes we took help of the Certified Vendor. Vendor support was good.
View full review »It was a collaborative effort of our in-house and vendor teams. The support was good & quite appreciable.
View full review »IE
Ikede-Ebhole
Cyber Security Consultant at Wirespeed
Overall, the process is very fast and depends on the type of deployment. For example, replacing a Cisco firewall with Check Point requires converting policies, which can take quite a while, depending on the size of the policy base. In my personal experience, setting up Check Point was very quick.
View full review »JH
reviewer2005806
Payroll Specialist at Dice
The deployment was done through the vendor team.
View full review »RW
Robert Weaver
Senior Systems Engineer at Upper Occoquan Service Authority
We used a consultant. Our experience with them was very good.
For deployment and maintenance, we have five people on our staff. We have to do some maintenance on it. It's pretty much scheduled to rotate between us so that we keep our skills fresh.
View full review »IY
Ivailo Yanchev
System Administrator at Grant Thornton
We did everything in-house.
View full review »MA
reviewer1247181
Service Manager at a construction company with 10,001+ employees
Check Point NGFW requires security and OS patching, and life cycle management. Every three to five years you need to replace the hardware. We have a dedicated team that does the maintenance of the solution.
It's hard to say exactly how many people are involved in implementing and maintaining the solution because some of the work is outsourced, but I would say it's a team of approximately between 10 and 20 people.
View full review »GB
Guillermo Buritica Tobon
Consultant - Site Reliability Engineering Manager (SRE) - Managed Services at Servian
The vendor did all the migration in just a couple of hours.
View full review »VP
Vanjela Pine
PLM Consultant
We did an in-house implementation.
View full review »YK
reviewer2335599
Chief Information Security Officer at a consultancy with 1-10 employees
The deployment time varies depending on the scale of the project. For small cases, it may only take a couple of minutes, while larger-scale deployments can span up to a month. Having a skilled engineer is crucial; one proficient engineer can handle the job effectively. Maintenance is relatively straightforward.
View full review »VC
reviewer1961277
Implementation Specialist at NTT Security
We handled the setup in-house.
View full review »The Check Point support team is one of the best. When I need them, they can escalate the ticket to an appropriate level of engineer to fix the problem.
View full review »RS
reviewer1767759
Network at financial sector
The help we received was good.
View full review »JJ
reviewer1718697
Network and Security Engineer at BIMBA & LOLA, S.L.
The product was implemented by a partner and their expertise was very good.
View full review »BI
reviewer1691745
Technology Architect at BearingPoint
We did it ourselves.
View full review »ST
Swapnil Talegaonkar
Technology consultant at a tech services company with 501-1,000 employees
We implemented the firewalls with our in-house team.
View full review »We have around 20 people on the team, because it is a large company. So, I deployed it with the help of 19 members. The team of 20 people work on different shifts and we manage all the organization's firewalls. We are all network engineers, though some of us have different designations.
View full review »The installation was done jointly with an engineer provided by the supplier, and his capacity was good.
View full review »AC
Alexander Cosgrove
Works at sep2
We implemented the solution in-house.
View full review »We worked with Check Point professional services.
View full review »We handled the setup in-house.
View full review »DD
Dheeraj Dexit
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
For the deployment process, there were only four senior network engineers involved from our company.
SR
reviewer2323554
Technical Engineer at a tech services company with 11-50 employees
In our deployment process, there are two methods available: standard and distributed. The predominant choice in our country is the standard deployment, utilized by approximately ninety-two to ninety-five percent of our customers. In the standard deployment approach, a separate server is configured with three ports, situated between the firewall and the switch. Configurations are not directly applied to the firewall; instead, they are made on the server. After completing the configurations on the server, the changes, such as creating new firewall rules, are not immediately connected to the firewall. Instead, they go through the server, where calculations are performed, and the configured rules are loaded. If a misconfiguration is detected, the server notifies us, highlighting any inaccuracies in the rules or policies. This preventive measure helps avoid applying flawed configurations directly to the firewall. Regarding the ISMP modules, I believe a single individual is sufficient. Given some time for research, this person should be able to deploy it efficiently for me. The deployment time varies depending on the configurations. Maintenance primarily involves updating the firmware; aside from that, there are no additional requirements.
View full review »SQ
reviewer9837493
IT Manager at Gainwell Technologies
We have always used Check Point Professional Services to assist with our implementation. They are very knowledgeable and can save you a lot of time and frustration.
View full review »WB
reviewer1694964
Senior System Administrator at Seminole Electric Cooperative, Inc
We handled the implementation in-house.
View full review »ES
Erwin Sprengers
Innovation Consultant at KPN IT Solutions - Trusted Services
We handled it on our own.
View full review »BD
Basil Dange
Senior Manager at a financial services firm with 10,001+ employees
Our in-house team deployed it with support from the OEM.
View full review »MB
reviewer1728645
IT Security Engineer at PricewaterhouseCoopers
We used a vendor team along with our in-house team.
View full review »We used Check Point for implementation, and they are top-notch. They know the hardware and software better than anyone.
View full review »GC
reviewer1629138
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees
We did the implementation with vendor support.
View full review »SK
reviewer1625355
Project Manager at a financial services firm with 10,001+ employees
Yes, and we had a good experience.
View full review »MP
Mahendra Pal
Network Security Engineer at a tech services company with 10,001+ employees
We have a very good in-house engineering team that does the setup and configuration. We did not require any third-party assistance because we have had full training on it.
Our deployment included seven or eight people who were working in different shifts. Similarly, we have three to four network security engineers working in shifts who maintain it. This includes things like dealing with tickets for updating policies.
View full review »RM
Rachit Malhotra
Senior Network Engineer at a tech services company with 1,001-5,000 employees
We didn't require any external help for the deployment. Our R&D and tech were capable of doing it. Our deployment team consisted of six to eight people, working in different shifts, to configure it.
View full review »IK
reviewer1404666
Security Expert at a aerospace/defense firm with 10,001+ employees
I did most of my deployments by myself, but in our headquarters, where there was an older version of a Check Point version, and they wanted to migrate to a new one, I used a partner. The partner I used was SafeWay, a company in Israel. They have quite extensive knowledge and they are very professional.
View full review »AK
reviewer1963764
Network Engineer at Pevans EA Ltd
The initial implementation was with the help of a vendor with good knowledge of the product.
View full review »GA
reviewer1696383
President at NGA Consulting, Inc.
We handled the initial setup in-house
View full review »GA
reviewer1696383
President at NGA Consulting, Inc.
We implemented the solution in-house.
View full review »I don't believe we've ever had to actually call Check Point to assist with anything. It's pretty straightforward. The wizard does most of the work and we have all the instructions we need. It's pretty much all done in-house.
View full review »We implemented the solution through a vendor. They offered excellent support.
View full review »NM
Nilson Moya
Logical Security Deputy Manager - IT at a financial services firm with 1,001-5,000 employees
The provider we have used has highly qualified staff and offers excellent and professional services.
View full review »JK
reviewer1633176
Senior Infrastructure Technical Lead at a financial services firm with 10,001+ employees
We handled everything through Check Point PS. They were very good.
View full review »I.
Ifeanyi Onyiaodike
Network security engineer at Fidelity Bank
We used a Check Point partner for the installation. I was involved in the deployment, meaning that while they were deploying I was there. They even took us through some training.
View full review »CC
reviewer1830165
Technology at Partswerx
We handled the implementation in-house.
View full review »NI
reviewer1720029
Snr Information Security Analyst at The Toronto Star
Implementation was done with the help of Check Point's professional services.
View full review »AH
Anthony Hassiotis
Works
We have used several vendors and some are better than others.
View full review »It was implemented through a provider that has been guiding us towards the correct use of the equipment and the best practices to keep it updated. The service has been excellent, both in common day-to-day ticketing situations, including the most serious incidents.
View full review »AS
AnkurSingh
Technical Support Engineer at AlgoSec
We initially opened a case regarding the upgrade. Check Point's technical support was there on the call because the upgrade was going from version R77 to R81.10. This was a major update for the entire network, and they were there supporting us in case of any issues.
View full review »Check Point authorised partner had been involved in the migration to avoid any operation issue
View full review »RF
Ricardo-Fernandes
Manager for Operations, Security and Management at REN - Rede Energeticas Nacionais, S.A.
The initial setup was completed by a partner, who was a certified system integrator.
Our in-house team handles maintenance.
View full review »TK
Timur Kurbanbayev
Technical Engineer at a tech services company with 11-50 employees
Deployment duration varies based on the customer's specific conditions. On average, an installation might take around twenty minutes.
View full review »RS
reviewer1643319
IT Manager at a transportation company with 501-1,000 employees
We implemented it through a vendor called S G Informatics India Pvt Ltd.
The level of expertise I would rate at 10 out of 10.
View full review »I handled the implementation myself. I did not need the assistance of an integrator or consultant.
View full review »BF
BrianFischer
Senior IT Manager at a mining and metals company with 501-1,000 employees
We had two different ways of getting help. We have local representatives who are in the same metropolitan area and they were very responsive. Then when we would have to contact standard support. We were satisfied about 80% of the time. Sometimes follow-up was not there. Sometimes there would be delays and occasionally there would be rehashing of information that didn't seem like it was efficient. Eventually, we would get the answers we would need.
That's why we rely heavily on the local people because they could sometimes light a fire and get things moving a little bit quicker.
In-house team - we have a Check Point Certified engineer.
View full review »SA
Sadiq Abdulwahab
Network Administrator at N S PHARMACY SDN.BHD.
We had a partner. A representative of Check Point came and did the implementation.
View full review »TL
reviewer1721655
Networking engineer at Hewlett Packard Enterprise
You need to work with a vendor that is overall quite knowledgeable.
View full review »I.
Ifeanyi Onyiaodike
Network security engineer at Fidelity Bank
From scratch to finish, deployment took about a month. It took this long because we had to convert all of our existing configurations from Cisco Firewall to Check Point. We had to get help from our vendor to do this. He had to manually convert each and every command from our existing Cisco device to Check Point — that took a while. This was the main reason that deployment took so much time.
The end-user VPN didn't take much time to deploy. Neither did the site-connecting with the VPN — that took a day or two to deploy.
View full review »TK
Timur Karimov
IT Consultant/Engineer at a computer software company with 11-50 employees
I handled the implementation myself.
View full review »AO
Soji
Head of Technology at African Alliance Plc.
The product was implemented through a third-party vendor.
View full review »ED
reviewer1678680
Senior Linux Administrator at Cartrack
It was through a vendor, and they were very good and did it on time as they promised.
View full review »RG
Rahul Gombhir
Network Security Engineer at a tech services company with 10,001+ employees
I was not present when the first firewall was set up, although I was presented for the deployment of new ones. Whenever there is a new firewall deployment, I am involved. We have between four and five network engineers who take care of this part.
There is no maintenance required from our side. When we have a hardware issue then we contact technical support to get it sorted out.
View full review »CL
reviewer1419591
System Architekt at a insurance company with 1,001-5,000 employees
When we tried Threat Emulation, we have received professional services from Check Point. However, for the normal setup, we don't involve any professional services.
View full review »AA
reviewer1392342
Sr. Security Engineer at a financial services firm with 10,001+ employees
We do it ourselves most of the time. We only take help when it comes to scalable platforms, like big chassis firewalls, which are little complicated. Then, we get outside help.
I manage the operations team and have also been involved as a consultant.
We have some best practices in place that we follow.
There are four security engineers who deploy and maintain this solution.
View full review »PI
reviewer1613238
IT Manager at a comms service provider with 51-200 employees
The implementation was through a vendor, and the installation went really well. The consultant was Check Point certified and explained everything in detail.
Later on, we added new remote sites to the configuration (in-house) without any problem. We didn't need to check with the vendor.
View full review »PD
PRAPHULLA DESHPANDE
Associate Consult at Atos
I implemented it with the help of a vendor.
View full review »KK
Kamal Khurrana
Network Associate at a wireless company with 1,001-5,000 employees
Our in-house team was in charge of the deployment. We have a team of seven people that work in shifts, and we did all of the work, with some support from Check Point.
Six or seven people in different shifts are required for maintenance. At any given time, we generally work with two or three people during the same shift. I think that two people working at the same time are sufficient.
View full review »JZ
reviewer1855902
Senior Consultant at Integrity360
We handled the setup in-house.
View full review »RA
Rajan Arora
AVP - IT Security at a tech services company with 51-200 employees
We had assistance from the vendor's professional services team to ensure smooth deployment. It was a green field project so the deployment was easy. The team deployed on implementation had expertise with the solution.
View full review »AP
reviewer1454139
IT Infrastructure & Cyber Security Manager at a retailer with 501-1,000 employees
We deployed it with the help of a partner, called Spider Solutions, here in Israel. Our experience with them was good. The technician that came here to install the firewalls was professional and thorough. Everything went according to plan, with no issues.
The whole initial setup was done by the partner and our role was more oversight to see that everything was okay and to give the information that was needed to proceed.
View full review »The implementation was done through a vendor.
View full review »OD
Oren Dror
Security IT Manager at IFAT Group
We had an integrator that assisted us with the implementation.
View full review »AN
reviewer1582053
Security Engineer at Gosoft (Thailand)
The vendor implemented this product for us.
VR
Vighnesh Rege
Lead Solution Advisor at a consultancy with 10,001+ employees
We are working with Check Point Firewalls to provide installation, migration, updates, setup, etc.
In the beginning, we needed help from the vendor with the setup. The support was good.
View full review »JM
Jose Mendes
Network Security Engineer/Architect at Euronext Technologies SAS
We implement the firewalls ourselves.
View full review »BS
Bui Son
Security Manager at FPT
I implemented this solution by myself.
View full review »AJ
Arun Jethy
Sr. Network Engineer at a tech services company with 51-200 employees
We didn't require Check Point's help during deployment. After deployment, we did require their help for critical cases.
View full review »GR
reviewer1260276
Senior Network Security Engineer at a tech services company with 1,001-5,000 employees
Our In-house team handled the implementation.
View full review »KK
reviewer1412340
IT Specialist at a tech services company with 10,001+ employees
We did the deployment ourselves. We have onsite specialists who have done many deployments.
20 people take care of the deployment and troubleshooting of this firewall.
View full review ȆG
Ümit Güler
Consultant at KoçSistem
All implementation is handled by our team.
View full review »SS
SamirShah
Network Security Consultant at a energy/utilities company with 5,001-10,000 employees
We do it ourselves.
View full review »AK
AjayKumar3
Sr. Network Engineer at a insurance company with 5,001-10,000 employees
We had help from a Check Point integrator. It was a good experience. They were very helpful.
View full review »TL
reviewer1055286
IT Security Administrator at a tech services company with 51-200 employees
We had a partner set up the solution for us.
View full review »ND
Nikhil Dhawan
Associate Consultant at a tech services company with 10,001+ employees
I deployed it myself with the help of one or two of my colleagues.
View full review »PD
PRAPHULLA DESHPANDE
Associate Consult at Atos
We are only vendors.
View full review »TR
reviewer1642947
System Analyst at a comms service provider with 51-200 employees
We hired a company to do the implementation. I don't remember the dynamics of the team. The last time it was set up, there were two people on the implementation team.
View full review »BU
reviewer1676622
System Security Engineer at Ziraat Teknoloji
We did and their expertise was high. We did not face many problems.
View full review »RA
SeniorNe6c94
Security Engineer at Tenece Professional services
For the first setup, I used a consultant. For the second one, I didn't. We didn't need one.
View full review »DH
Dan Huang
Senior Network Engineer at a retailer with 5,001-10,000 employees
We had Checkpoint support engineers for the implementation. The people are helpful. They support their product. The problem is that there were too many problems. Even their support can't fix it. They try their best to help but when the product isn't great, there's not much you can do.
View full review »GD
Gaurab Dev Manandhar
Senior Network Administrator at a financial services firm with 1,001-5,000 employees
We needed help from the Check Point expert experts because we deployed it in the HA. It's a bit different from the other firewall vendors. You need a Check Point expert to deploy it initially.
We have a five-person technical team for the maintenance of the solution. We use managers, admins, engineers, and developers.
View full review »JV
Juan-Vallecilla
Engineer at CENACE
I implemented using a vendor team, whose performance was good.
View full review »CS
ChandanSingh
Senior Technical Consultant at Ivalue Infosolution
Our in-house team does the installation for our clients. We also handle support, depending on what level of support the client has. Sometimes, they go directly to the OEM.
View full review »SJ
Shivani Jethy
Network Security Administrator at a computer software company with 201-500 employees
We do the deployment ourselves, but if we face any kind of issue, we just raise an issue with their TAC.
View full review »In-house
View full review »I implemented and deployed Check Point NGFW alone.
View full review »DM
DiegoMirones
General Manager at Qhawariy
When it comes to the deployment and maintenance, there are two people involved, one for the deployment and the other for monitoring, consisting of an engineer and a technician.
View full review »GG
reviewer1402668
Security Engineer at a tech services company with 1,001-5,000 employees
We consulted with one partner of Check Point, who is our provider. If the issue is really big, then we open a case with Check Point directly via the partner. My experience with them was really nice. It was the best experience that I had ever had.
They have amazing engineers. Their expertise is unbelievable. They do integrations really well. They could improve on routing and networking, but the product is what is important for me.
View full review »We have a contract with the vendor to implement and deploy this solution for customers. There are three engineers on the staff who are responsible for maintenance and support, including dealing with tickets.
In total, working with this solution, we have four engineers and two junior administrators.
EF
reviewer1028424
General Manager with 51-200 employees
We have one staff member that does the implementation of the solution.
View full review »Buyer's Guide
Check Point NGFW
April 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,246 professionals have used our research since 2012.