Check Point NGFW Primary Use Case

Pushkin Sawhney
Principle Network and Security Consultant at a comms service provider with 10,001+ employees
I support multiple clients within the UK, the EMEA region, the US, and now in Asia Pacific as well. I specialize in Check Point firewalls. I design and secure their data centers, their on-premises solutions, or their businesses security. The firewalls are mostly on-premise because most of our clients are financial organizations and they have strict compliance requirements. They feel more secure and have more control when things are on-premise in the data center. However, there are use cases where I have helped them to deploy Check Point solutions in the cloud: AWS, Azure, and in Google as well. But cloud deployments are very much in the early stages for these clients, on a development or testing basis. Most of the production workloads are still on-premise in data centers. Most of my customers are still using R77.30, and they are on track to upgrade from that to R80, which is the current proposed version by Check Point. View full review »
Steve Vandegaer
Senior Engineer Security at a computer software company with 201-500 employees
For the SMB appliances, the use case is tricky because I don't actually like them too much. If you have a very small branch office, you could use one of them, but in that case I would just go for the lowest version of the full GAiA models. But for small locations that are not that important, it is possible to use one of the SMB appliances, the 1400 or 1500 series. The full GAiA models, starting with the 3200 and up to the chassis, are the ones we work with the most, and you can use them in almost every environment that you want to secure, from Layer 4 to Layer 7. The only reason to go higher is if they don't perform well enough, and then you go to the chassis which are for really big data centers that need to be secure. About a year or a year-and-a-half ago, they introduced the Maestro solution, which gives you the flexibility of using the normal gateways in a way that you can extend them really easily, without switching to the chassis. You can just plug more and more gateways into the Maestro solution. View full review »
Senior IT Manager at a mining and metals company with 501-1,000 employees
Our primary use cases for Check Point NGFW are for perimeter security and content filtering for browsing behavior. View full review »
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,041 professionals have used our research since 2012.
Network and Security Specialist at a tech services company with 51-200 employees
In my previous company, one of the clients was a big chocolate company. They had this payment card infrastructure (PCI), where they needed to have auditors from PCI check the firewalls to see if everything was okay. So, they had web-based authentication. I'm working with the 5800, 5600, and 5200 models. I work with the UTMs as well. These are physical appliances as well as open servers. View full review »
Ifeanyi Onyiaodike
Network Administrator at a financial services firm with 5,001-10,000 employees
We use it for VSX virtualization and we use it for normal firewall functions as well as NAT. And we use it for VPN. We don't use a mobile client, we just use the VPN for mobile users. View full review »
Technical Support Engineer at AlgoSec
I had 3200 appliances deployed in my company where we had two CMSs. We had multiple VSXs on those appliances due to the main firewall that we had on the VLAN. We also had an external firewall on the VLAN, which were used to monitor and allow the traffic within the network. That is how we were using it. They have a new R81 in place. Currently, they also have R75 deployed in the environment, but they are planning to upgrade to R80.20 because that particular firewall has very high CPU utilization and there is no more support for R75. View full review »
Network Security Architect at a financial services firm with 1,001-5,000 employees
The primary use is to segregate the environment internally to create a lab environment and a production environment, for example. We also use them to protect the company from the internet and when going to the internet; to protect the perimeter of the company. We use them to create a VPN with customers and clients, and with the other companies that belong to the group. We work with 1200s, 1500s, 4000s, and 5000s. View full review »
Matt Millen
Network & Systems Administrator I at DMH
We use several of the blades. We use it for regular access control, but we also use the application control. We use HTTPS inspection and threat prevention. We use the Mobile Access blades as well IPS. We have a Smart-1 205 as our management server and for the gateway we've got 3200s. View full review »
Security Team Leader at a aerospace/defense firm with 10,001+ employees
The reason we have the Check Point Next Generation Firewall is that it's our main perimeter firewall in all our branches around the world. It secures the IT infrastructure in all of our environments and our subsidiaries. We also use it to set up tunnels between all our sites. We have multiple versions from the legacy R77 to the latest R80.40. View full review »
Security and Platforms Engineer at a K-12 educational company or school with 201-500 employees
I am using this solution for perimeter security in the company. Our firewall security is centralized under one management. Also, we use this firewall to manage some of the VPN clients and the employees' access across the company. Each firewall is capable of using the VPN client, but we only use two. We have five in total, but we only use two for these issues. I am using the firmware version for the operating system. The blades are firewalled for IPS and mobile access. View full review »
System Engineer at a insurance company with 1,001-5,000 employees
We use it as a normal firewall for perimeter security, using some of the Next Generation features, like Anti-Bot and Antivirus. We have two ISPs. We have a different firewall system in front of the Check Point Firewall. We also have normal Cisco switches combined with the Check Point solution. Then, our internal network is with Cisco, which is about 300 servers and 1,500 clients. View full review »
Oswaldo Gimeno
Network Engineer at Getronics
The primary use of the firewall is to allow or block some traffic. Mainly, it is the perimeter firewall for the Internet. It filters the traffic from external to internal, e.g., to secure the traffic. Some of our customers have been demanding Check Point as their firewall product. I do the installation, support, firewalls, etc. View full review »
Sunil Redekar
Security Engineer at Hitachi Systems
We are mainly using it for policy installation and access purposes. We have a bank project where we are using mobile access, Antivirus, and IPS. These are all are configured on the Check Point Firewall, where we are using it on a daily basis. I have worked on the following firewall series and models: * 15000 * 23900 * 41000 * 44000. I have worked on the following versions: * R77.30 * R80.10 * R80.20. I am currently working on the R80.20 version and the hardware version is from the 23000 series. View full review »
Sr. Security Engineer at a financial services firm with 10,001+ employees
It is a typical firewall that has been implemented in most of our regions. We use it for normal firewall policies and VPNs. We are mainly using Check Point firewalls. We also have a few Check Point cloud security programs. View full review »
Shivani Jethy
Network Security Administrator at a computer software company with 201-500 employees
We use it to provide security in our organization. Check Point Next Generation Firewalls are designed to support large networks, like a telco environment. View full review »
Amit Kuhar
Network Security Consultant at Atos Syntel
We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices. Atos provides this solution, including network design and advice. View full review »
Sathish Babu
Solutions Consultant at a computer software company with 10,001+ employees
We provide solutions for various customers where we apply Check Point Firewalls, either for a VPN gateway or for securing their networks. We have provided them to a couple of financial customers to protect their mobile banking as well. View full review »
Nikhil Dhawan
Associate Consultant at a tech services company with 10,001+ employees
My role is to do implementation and troubleshooting on the Check Point Firewall. We use this firewall for our organization's security by adding restrictions and security from viruses and other tech from the external Internet. It is used in our internal company-wide network. It protects our company throughout the LAN network. View full review »
Rakesh Gupta
Solutions Lead at a tech services company with 1,001-5,000 employees
It's an on-prem deployment where we use it to protect our client and end-users who are working with the internet, and to protect their servers from external access. They have about 100 users and two servers. View full review »
Rohit Gambhir
Sr. Network Engineer at a consultancy with 51-200 employees
We use it to protect our network from the outside world and unsecured networks. We also use it to provide a safe, secure network to the internal users of our organization. I am using various versions on the model, like R80.10 and R80.30. View full review »
Vighnesh Rege
Lead Solution Advisor at a consultancy with 10,001+ employees
We recommend to clients who are installing applications that they can work with Check Point Next Generation Firewalls. Our role is to support our customers in terms of their migration, firewall room cleanups, and implementing all the security features that the firewall has. Our clients have branch offices in Mexico and Bermuda. Check Point is one of the top names in these areas. View full review »
Firewall Administrator at a tech services company with 1,001-5,000 employees
We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use. View full review »
Oleg P.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Our company works in developing and delivering online gambling platforms. The Check Point NGFWs are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Clusters serve as firewalls for both inter-VLAN and external traffic. View full review »
Sr. Network Engineer at a insurance company with 5,001-10,000 employees
We use Check Point's firewall to provide network security to our organization as well as to other, third-party vendors. View full review »
Deputy Manager (Systems) at State Bank of India
Check Point NGFW is being used as a security product in the environment. It is securing the IT infrastructure and delivering the services as expected. In the current world scenario, IT is becoming the backbone for every organization, and most business is highly dependant on IT so securing the IT infrastructure is becoming challenging. Check Point NGFW meets the expectations of our organization to secure the IT infrastructure as per organizational need. Check Point NGFW also gives many security features in single box which reduce your management complexities. View full review »
Network Engineer at a legal firm with 1,001-5,000 employees
We use it for standard firewalls. View full review »
Arun Jethy
Sr. Network Engineer at a tech services company with 51-200 employees
We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world. I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances. View full review »
Network Security Consultant at a energy/utilities company with 5,001-10,000 employees
We work with these firewalls for overall security, including content filtering. View full review »
Swapnil T
Technology Consultant at a tech services company with 201-500 employees
The Check Point Next-Generation is a firewall that provides security to our inside network from the outside with next-gen features like Blocking Antibot, Antivirus, IPS, etc. Other than that, Check Point supports threat prevention for zero-day attacks. With the addition to that Check Point firewall, it also provides a VPN. We can configure Star and Mesh IPSec VPN as well as SSL VPN. Logging and reporting is one more important aspect when we talk about firewalls and Check Point did a great job in that. View full review »
IT Specialist at a tech services company with 10,001+ employees
We use it to provide security to our environment from the outside world. We are using it to provide security against vulnerabilities using threat prevention, Antivirus, and IPS. View full review »
Security Analyst at HOST
We use Check Point NGFW as a perimeter NAT Gateway with the security features, it helps us to prevent hackers. We implement Check Point-based infrastructures for our customers. In most cases, this is the same perimeter gateway and internal segmentation firewalls. Many of our customers also using the VPN feature to organize remote access to the company's assets for employees, especially in the COVID period, and to connect their branch offices to the base infrastructure. Environments are differing from one out customer to another, but these are primary use cases. View full review »
Dan Huang
Senior Network Engineer at a retailer with 5,001-10,000 employees
Our primary use case of this solution is to use it as a security gateway. View full review »
Security and Network Engineer at a tech services company with 501-1,000 employees
The Check Point NGFW is the best product that I have ever used. It has pluses and minuses, as do others, but the usability, simplicity, and the configuration abilities are very user-friendly. After a while, other vendors just don’t come close to it. The second thing is that is just works and it does it with ease. The upgrades and bug fixes are frequent and well documented. Also, the patches just work ;-) There are some negatives but as I already said, they aren’t many and from my point of view, we can see past them. View full review »
Pau Ronda
Junior Network Specialist - Cloud Operations Engineer at a computer software company with 5,001-10,000 employees
We use them to protect our edge infrastructure and for interconnecting our sites using the VPN. View full review »
IT-Infrastruktur at Synthesa Chemie Ges.m.b.H
Check Point protects our environment from external threats. In particular, we use: * Application Control for Internet access * HTTPS Inspection for outgoing connections into the internet * Separate the OT network from the normal data LANs * SSL VPN for End Users - Check Point Mobile VPN Client is used on the end-user clients * Site-to-Site VPN for connecting other companies to our environment We are using two Check Point boxes in a ClusterXL Setup so that one appliance can die and the environment is not affected. We also use a cloud gateway for internet security on users, which are only connected to the internet (outside the office). View full review »
Kirtikumar Patel
Network Engineer at LTTS
I have been using this solution since the GAIA OS R77 was there. I am using it for my day to day access such as policy creation, policy modification, and also regularly policy disabling and deletion. I have 17K+ users in my organization, 100 + client to site VPN and I have a number of S2S as well. My daily job is health checkup, security log monitoring and incident management, daily IPS checks, threat presentation reports and to analyze the risk and take necessary action on that as well. View full review »
Sandun Fernando
Network Administrator at University of Kelaniya
We are a large University with more than 1000 employees across seven faculties and growing. Student population is more than 15,000 in-house and 30,000 external. The University of Kelaniya Sri Lanka primarily uses the Check Point 4800 device to protect users and servers. The product also enables the VPN with advanced security policies inside our network. This gives us a better security posture. Valuable features include a good VPN, IPsec, and SSL. We use Check Point 4800 as a perimeter firewall and our internet bandwidth expanded to 1Gbps. View full review »
Network and IT Security Admin at DP World Callao
Check Point is a very good solution. My primary use case is as a perimeter firewall. I never use Check Point's IPS. I always work with another IPS, in a different appliance. I always use the firewall modem as a firewall. View full review »
Network Security Engineer at Türkiye İş Bankası
We have a big environment with nearly fifteen multi-vendor clusters. We are using firewalls mainly for layer three access rules. But nowadays, application-layer-based security and threat prevention are also important. We are using IPS and antivirus blades actively, too. In the Intrusion Prevention System blade, we are using a lot of different signatures and actions according to the impact, severity, and cost of the specified signature. The antivirus blade is also in the same logic as the Intrusion Prevention System. View full review »
Sadiq Abdulwahab
Network Administrator at Nigerian Security Printing & Minting Plc
We primarily use the solution as a firewall device and for our VPN. View full review »
Senior Technical Consultant at Ivalue Infosolution
I am a Check Point distributor and the Next-Generation Firewall is one of the products that I am dealing with. My customers use this as part of their security solution that covers mobile devices, computers, their network, cloud, SD-WAN, IoT devices, IP phones, IP cameras, and others. View full review »
Presales Solutions Architect at Paladion Networks
Check Point leading industry provides a complete solution that is required to perimeter security along with deep packet inspection for network traffic. Check Point not only acts as a traditional firewall but it provides you with complete security for users who work from home. Work from home users observed that Check Point gives 100 % functionality without any trouble. It offers centralized management to customers where they have an IT member so there Check Point management can work properly. It is available in a smaller range to higher. Customers can get it at an affordable price. View full review »
Yamini Kapoor
Network Security Engineer at R Systems
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance. View full review »
Manager for Operations, Security and Management at REN - Rede Energeticas Nacionais, S.A.
Our primary uses for the Check Point NGFW are network segmentation, identity awareness, and application control. View full review »
Gerry Moore
Head Of Technical Operations at Boylesports
This is a complex high availability solution growing by over 100% per year. The complexity of the business environment made the ability to increase capacity without having to remove previous hardware much easier. We have a large online presence with users needing realtor access to our environment. View full review »
Viplav Patil
Senior Manager, Information Technology at a financial services firm with 10,001+ employees
The firewall is the primary use case of this solution & IPS is secondary use case of the solutions. We are looking forward to Sandblast solutions. We also use it for cloud expansions The Check Point NGFWs brought up the security level with the help of the advanced software blades - we use Application Control, URL Filtering, IPS, Anti-Bot, and Antivirus. The setup was simple, and the performance is great - we have significant resources to expand the environment in the future without disabling any blades and thus maintaining the security on the same, high level. View full review »
ICT-System-Specialist at a insurance company with 5,001-10,000 employees
We use Checkpoint Firewalls to protect Datacenter VLANs against each other. In addition, we use them to protect our perimeter systems from the internet, and our internal network from the perimeter. We have virtualized the systems on a VSX-Cluster using VSLS, but the basics are still the same compared to a traditional cluster. VSX gives us a bit more flexibility in the case of load-sharing. Therefore, it’s quite easy to react in the case of heavily used hardware distributing the load by failover or prioritizing VSs onto different nodes. View full review »
IT Security Manager at a sports company with 10,001+ employees
*Perimeter Firewalls - to protect regional hubs and local offices from public space and provide L3-L7 filtering *Internal Segmentation Firewalls - to secure company's internal network from movement of malicious actors and reduce traffic flows only to authorised ones *Public and Private Cloud - to secure hybrid environment either onprem or in the cloud while achieving micro segmentation per host *Cloud Compliance - to get a visibility into cloud environment and and related vulnerabilities *Data Center *SaaS View full review »
Sales Engineer at Unistar
We are a system integrator and the Check Point Next-Generation Firewall is one of the solutions that we implement for our clients. It is primarily used for data protection, VPNs, and sandboxing. We also use it in our own data center. View full review »
Security Engineer at Tenece Professional Services
The management of our company requires a firewall implementation. We use Check Point to complete the network compliance rules. View full review »
Deputy Manager - Cyber Security at a transportation company with 5,001-10,000 employees
We use this solution for our perimeter firewall to protect our web applications, systems, and network. We are running our complete business with Check Point. The complete traffic is managed by Check Point. The Check Point threat emulation blade is enabled to protect zero-day attacks and it will detect and prevent attachments and other payloads from this type of attack. View full review »
Juan Vallecilla
Engineer at CENACE
We use this product as firewall protection. View full review »
IT Operation Manager at a transportation company with 1,001-5,000 employees
We primarily use this solution for routing and the protection of our internal corporate network. View full review »
Brent King
Supervisor of Network and Datacentre Operations at Manitoba eHealth
* Perimeter and datacentre firewalls * URL filtering * Anti-bot * Anti-malware * Application awareness. View full review »
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,041 professionals have used our research since 2012.