Check Point Security Management Previous Solutions

Sadiq Abdulwahab
Network Administrator at Nigerian Security Printing & Minting Plc
We did previously use a different solution. They didn't have support locally in my country and this was difficult for us. Everything was done via mail or phone and it was not helpful. With this solution, if the situation cannot be remotely addressed within 48 hours, they will come to my office in person and attend to me. It's much better. View full review »
reviewer1181253
System and Network Engineer at a non-tech company with 1,001-5,000 employees
We didn't previously use a different solution. View full review »
GeraldChege
ICT Officer at Kenyatta National Hospital
Yes, we were using Dell SonicWall. View full review »
Find out what your peers are saying about Check Point, Elastic, Fortinet and others in Log Management. Updated: May 2020.
420,458 professionals have used our research since 2012.
David Roy
Head of IT
There was no previous solution. I inherited this one. When selecting a vendor, the most important criteria are history, reputation, and looking at the industry ratings. View full review »
Mario Figueiredo
Security Specialist at a insurance company with 501-1,000 employees
In the past, we had a type of proxy for our URL filtering. The idea was to have everything packaged in the same solution. We removed the proxy and started to use just the firewall to control URL filtering and normal firewall rules in the same solution. When selecting a vendor, we always check the industry reviews. Then, we analyze the features and, after that, the price-feature combination is the most important factor: which one has the best price and has the features we need. View full review »
Find out what your peers are saying about Check Point, Elastic, Fortinet and others in Log Management. Updated: May 2020.
420,458 professionals have used our research since 2012.