Check Point Security Management Primary Use Case

reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs. View full review »
Oleg P.
Senior Network and Security Engineer at a computer software company with 201-500 employees
Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning. View full review »
Sadiq Abdulwahab
Network Administrator at Nigerian Security Printing & Minting Plc
We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product. View full review »
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2020.
442,764 professionals have used our research since 2012.
Kirtikumar Patel
Network Engineer at LTTS
We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration. View full review »
reviewer1181253
System and Network Engineer at a non-tech company with 1,001-5,000 employees
We are primarily using the solution as a firewall, and for some IPS features as well. View full review »
GeraldChege
ICT Officer at Kenyatta National Hospital
We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment. View full review »
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2020.
442,764 professionals have used our research since 2012.