Check Point Security Management Primary Use Case

reviewer06814135 - PeerSpot reviewer
System Engineer at Willson International Limited

We use the product as a primary gateway firewall for all offices at different locations. 

We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

View full review »
Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS

We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.

We are using management API to apply large configs, clear rules, block malicious IP addresses with SAM rules, and migrate the VLANs with it.

We deployed a management HA to provide rulebase synchronization to our DRC firewall segments. We also distributed logs to different Smart-1 appliances to gain performance.

View full review »
DD
Network Engineer at CMA CGM

We are managing Check Point firewalls worldwide, and establishing VPNs between the main data centers in geographic regions and the other agencies worldwide.

We also establish VPNs between agencies and customers depending on the need. Several different VPN communities are used. We also establish VPNs with customers and partners with different firewall brands (Cisco, Fortinet, Juniper, etc.).

We manage security policies for more than 300 hundred Check Point firewalls by using security policy templates and models.

View full review »
Buyer's Guide
Check Point Security Management
April 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.
ML
It Security Engineer at TSYS

Our use cases are protection infrastructure in a financial corporate environment.

View full review »
RW
Senior Systems Engineer at Upper Occoquan Service Authority

We use the solution for cybersecurity.  

We use a Check Point internet security appliance and have recently purchased their endpoint security solution.  

We have found the systems easy to manage and monitor. These systems are providing critical security to our computing systems. Past systems have required multiple products from multiple vendors. The Check Point solution provides multiple products under a single interface, greatly simplifying my job.  

We have yet to implement all of the blades/features of the Check Point solution, however, we are very happy with those we have used.

View full review »
KP
Network Engineer at LTTS

We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40.

Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.

View full review »
CM
Advisor at Rossell Techsys (Division of Rossell India Limited)

We utilize Check Point Security Management for our daily security operations, including managing firewall rules, reviewing alerts, and generating reports on a weekly basis.

View full review »
Charity Kimotho - PeerSpot reviewer
Information Technology Technician at Smoothtel & Data Solutions Ltd

We use the solution mostly for policy pushing to other gateways.

View full review »
MOHAMEDELSHERIF - PeerSpot reviewer
Senior Technical Consultant at International Turnkey Systems - ITS

The Check Point Security Management is designed with a strong focus on cybersecurity, providing customers with detailed information on attacks and high-visibility threats. This is a major benefit, as it allows customers to stay informed on a daily basis. 

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

We wanted a centralized administration console to allow us to manage more than one team inside or outside our organization. As a result of this need, we were looking for solutions that could complement us and provide effective and functional management of more than one team inside or outside the organization. 

It was then that we came across and used Check Point, a solution that allows us to integrate and manage all these teams from one place. Check Point offered us not only a centralized administration, but it also offered us and gave us added value in different services and features that can be integrated into the centralized administration platform.

View full review »
AJ
Head, Partner Management - Asia Pacific Middle East and Africa at a tech vendor with 10,001+ employees

One of the recent use cases for this solution has been related to a power company, which was facing issues but was able to get its infrastructure secured and get back its business continuity and growth. In addition, its management was able to get back its confidence with solutions or services provided by Check Point.

The client was able to quantify its security elements. As a result, a strong defensive framework was developed. Deployment of Check Point's solution resulted in the evasion of any existing and potential threats.

View full review »
Bharath Kumar Gajula - PeerSpot reviewer
Network Security Architect at a consultancy with 10,001+ employees

We use Check Point Security Management for firewall management.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

When having multiple branches, there is the need to be able to manage several branches centrally to meet internal and external regulatory standards that become part of important criteria to manage security. 

Due to the number of branches that we must protect and safeguard, we were looking for a solution that would allow us to centralize simple and fast management that is as scalable as possible.

View full review »
RO
Sr. Security Infrastructure Engineer at NTT Security

As a consultant for a security infrastructure consulting firm, I install and integrate this solution at client premises. There are many types of client domains, such as financials, government, healthcare, etc. 

It's a stable and complete product that is easy to use and capable of managing their next-gen firewall infra around the globe without compromises. 

Once the Check Point infra is up and running, clients really appreciate its capabilities of centrally managing security rules, making traffic flows visible, and quick detection and response capabilities in case of issues.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of our company's priorities was to have centralization of all the equipment in a single firewall. With the tools provided by Check Point, we were able to achieve it, and in this way we were able to centralize all the records.

With this implementation, we were able to make more centralized management and of all the rules. It was very comfortable to be able to configure them and manage them and thus be able to make the whole implementation more orderly and be able to carry out our organization along a good path of security administration

View full review »
Richard Lachira - PeerSpot reviewer
Consultant, Reseller and IT Infrastructure Projects at Elytelec

Check Point plays a crucial role in enhancing our security firewall solution in our company. It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering.

View full review »
LucianoMiguel - PeerSpot reviewer
Security Consultant at a consultancy with 501-1,000 employees

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

In recent years, management was to have an additional server in our data center or virtual machine that demanded resources locally. Today we have the possibility to have virtual teams in the cloud or on-premise and do not have the need to create that machine. We take that server to the Check Point cloud as a management cloud where we can have each subscription and be able to manage everything with the same account. It allows you to manage from anywhere and makes it easier for you to manage additional teams.

View full review »
Contracted IT Staff at Sağlık Bakanlığı-Turkish Ministry of Health

Security Management Server is easy to configure. We have more than six security gateways in different locations. It is easy to manage security gateways separately from Security Management Server. 

Also, we use a security management server as a log collector. Security Management Server is easy to configure. 

View full review »
RD
System Engineer Network & Security at a retailer with 10,001+ employees

We primarily use the solution for the management of thousands of rules. partially automated via the well-documented API.

Managing the rules is a day-to-day business that takes a lot of time. It is really good that we can do the management through the dashboard. It is so comfortable, and, in contrast to other manufacturers, is structured much better. The integration of the logs allows a quick jump by mouse click between rules and log entry.

The API reduces the administrative effort so that we can concentrate on the essential things. in addition, it is an enormous advantage for our customers that rules are created automatically and are available immediately.

View full review »
GC
Senior Infrastructure Service Specialist at a financial services firm with 10,001+ employees

I work for one of the biggest Australian banks that rely on Check Point firewalls for security enforcement across several points in the infrastructure environment.

The Security Management platform is a key component for our operation, in that it enables efficient central management for configuration and security troubleshooting. This centralised component facilitates and adds value to our daily operations, creating a single place for configurations and a platform that can present security logs that are used for the troubleshooting of security issues.

View full review »
Abnet Tsegaye - PeerSpot reviewer
Security Engineer at DeliverICT

Check Point Security Management Server is a comprehensive solution designed to streamline and centralize the management of security policies across an organization's network infrastructure. 

One of the standout features of the Check Point Security Management Server is its ability to manage security policies across multiple Check Point security gateways centrally. This centralized approach simplifies policy deployment, monitoring, and updates, making it easier for administrators to maintain a consistent security posture.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

The use of this tool is for the administration of policies, control, monitoring, and all the management of our gateway security tool. The separation of these environments has given us a robust solution in which we can apply and protect all the configurations created in our gateways without being afraid if we lose or damage the Check Point Security Management solution. Nothing bad would happen since we can create the environment again at the Microsoft Azure level and later restore the backup without being affected.

It also provides us with the required reports on perimeter security.

View full review »
SM
Network Engineer at Fujairah Port

We deployed the Check Point firewall for protecting our web servers and intranet servers. We used a management server as a centralized device for Check Point Gateway firewalls.

The best aspect about the notion is that we can push policy, IPs, or any other functionality to all or a subset of gateways. Alternatively, creating a distinct tab for each gateway gives a clear idea of the configuration changes and makes them less complicated.

Check Point's solution cuts down on the time it takes to manage multiple firewall devices.

View full review »
CM
Senior Infrastructure Services Specialist at St.George Bank Limited

As part of the Bank's Network Security Infrastructure team, it is our responsibility to manage different security products and devices that lay the foundation of the Bank's Security Infrastructure Network. Part of that responsibility also includes the implementation and policy update requests arising from different business and support teams to make sure that application services comply with the security standards to protect all services of the bank and maintain the reliability of the services across an environment.

With a centralized Check Point Security Management solution, it makes it easier for our day-to-day operations to manage all Security Gateway Firewalls across the bank. 

View full review »
CM
Senior Infrastructure Services Specialist at St.George Bank Limited

As part of the Bank's Network Security Infrastructure team, it is our responsibility to manage different security products and devices that lay the foundation of the Bank's Security infrastructure network. Part of that responsibility also includes the implementation and policy update request arising from different business and support teams to make sure that application services comply with the security standards to protect all services of the bank and maintain reliability of the services across environment.

With a centralized Check Point Security Management solution, it makes it easier for our day-to-day operations to manage all Security Gateway Firewalls across the bank.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

We needed a solution that had the things required to keep the company secure, like confidentiality, centralization, and a range of technological services. 

There weren't many other leading solutions that allowed us to achieve our goal of centralizing most security resources in one place to achieve rapid, unified management and control of our assets, achieve our annual goals, and provide the best service. 

View full review »
KP
Network Administrator at a computer software company with 1,001-5,000 employees

Check Point Security Management is primarily used for managing our security gateways that are deployed in multiple offices around the world. We have 20+ gateways in total. 

Security management also has reporting functionality which can be passed off to our internal security team as well as our senior leadership team. 

SmartView is also a handy utility that allows our system admins to have insight into the network traffic which reduces the need to contact the network support team each time something is not functioning.

View full review »
Oleg P. - PeerSpot reviewer
Senior Network and Security Engineer at a computer software company with 201-500 employees

Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

Thanks to the new Check Point management, we were able to manage our environments decentrally with a server or from the Check Point Infinity Portal. This management is handled separately and provides greater ease of implementation and backups. You can have your gateways separated from the control server. You can even lose the management server, and easily, with a previous backup, you can restore all the policies that had been generated so that you never lose the operation of the GW.

Our Check Point implementations are quite important in our environment. With them, we were able to shield our infrastructure from modern vulnerabilities.

View full review »
MB
Presales engineer cybersecurity expert en ElevenPaths at Telefónica

Throughout my professional career I have operated, implemented, and designed solutions with Checkpoint's NGFW for clients of all kinds - public and private, small and large.

For all scenarios, there is a suitable solution with this manufacturer. Its decades of experience make it one of the undisputed leaders in the industry.

In recent times, the platform has evolved significantly to meet the latest threats. I would recommend at least valuing it as an option whenever an opportunity arises to cover cybersecurity needs.

View full review »
PL
Firewall Engineer at a logistics company with 1,001-5,000 employees

We use Check Point Multi-Domain Management (Provider-1) to manage several customers with their firewalls as well as handle our internal administrators based on their rights.

Each domain (CMA) contains the customer's firewalls that are managed by us. Bigger customers with more than one domain use global objects as well as global rules so that administrators do not have to implement a local object for each domain.

Since this environment is bigger, we also use a dedicated log server for each domain. That way the logs reside in a different virtual log server.

View full review »
AB
Network Security Engineer at Atlantic Data Security

We work with multiple clients managing their network firewalls. This includes many multi-national networks as well as local systems in the U.S.A. 

We primarily are utilizing these products for managing customer/client environments to modify access rules and other policies for controlling traffic to and from both internal and external networks as well as cloud-based Azure systems. 

Check Point management products are in use in all these networks, including both standard Single Management Servers as well as Multi-Domain Management servers.

View full review »
DN
Assistant Manager IT Operation at a tech services company with 10,001+ employees

We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The different rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow. 

View full review »
SameerMogale - PeerSpot reviewer
Independent Business Owner at 3Kay Solutions

I am using Check Point to secure my home office because I'm doing all my work from home. 

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

We needed a solution that would be in the cloud or on-premise, that would centralize the equipment, and that would help us comprehensively manage each of the appliances that we were going to place in the four branches that we manage. Starting from that premise, we started with Check Point Security Management being the number one solution as it was pioneering in managing multiple computers simultaneously. This tool helped us to be more efficient and better at controlling risk with our hybrid cloud.

View full review »
LN
Technical Manager at M.Tech

With Security Management solution, we can manage and distribute security policies to firewall gateways. In large environment where there are dozens of Check Point appliances from Headquarter to branches, I deployed the Security Management with thousands of rules for an enterprise. I created different security packages for each gateway/cluster pair for administration purpose while maintaining separation and ease of policy installation. With every change request, we just need to configure the relating package and install to right gateways. Besides log dashboard in smartconsole is very useful and convenient for monitoring and tracking. It provides intuitive interface to search log, operation to filter is very to understand

View full review »
CK
Systems Engineer at Starlabs Limited

The solution is used to manage security gateways. We use the management server to manage our firewalls, one at DR and the other at HQ. 

The Management servers are also used to manage security policies to determine who or what system should connect to what. This allows us to block applications that are not needed per department. For example, Facebook is blocked for everyone except the marketing team. This helps keep people more productive. We also use the rules to prevent users from visiting dangerous and illegal sites.  

View full review »
reviewer2040309 - PeerSpot reviewer
Property Accountant at a real estate/law firm with 201-500 employees

The application intervenes in security situations in the organization and launches advanced threat prevention measures. 

It has automated security controls that can predict and block malware attacks. 

It is backed by AI deep learning that offers intelligent information and scales performance to unlock hidden malicious behaviors. 

Data fraud cases have reduced since we set up this product as the main security assessment platform. 

Employees can safely browse and share files with their colleagues without fear of external interference.

View full review »
SH
Senior cyber security specialist at Optiv

We use the solution for ensuring the on-premise and cloud-based infrastructure through the Check Point gateway solution. We're applying the solution to the endpoint and running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance. 

As compared to the other vendors like CISCO ASA, Juniper, and other vendors it's nice to see maximum futures in the single firewall. The site and remote VPN deployment are very easy and troubleshooting the issues is also very easy.

View full review »
SL
Software Engineer at CloudSense

The security management platform monitors the performance of applications and the security demands that can secure our data. 

Check Point Security Management has helped us to set secure points across all sectors to filter out harmful content that can destroy confidential information. 

The software has given the IT team access control in setting firewalls and securing cloud-based servers efficiently. 

This product provides comprehensive security coverage services that reduce operational costs. 

This tool has educated our teams and advanced our knowledge of setting effective security.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system.

Two separate packages are created for both perimeter & internal sets.

We are also managing a SandBlast device via Security Management.

Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

View full review »
GD
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees

We are using it on the cloud for cloud segmentation and as a VPN for users. We have been implementing Checkpoint on Azure's cloud for configuring scale sets for internal and external firewalls and as a gateway group active/standby for the VPN. The solution is implemented using a Multiple Entry Point feature. This allows us to use the same URL deplyed for all users and let them connect to the nearest node. We use other features like IPS, Threat Control, and Antivirus/Antibot for protecting our servers. We wanted to implement the SCV feature but it's not working. We've been working with support for months without a resolution.

View full review »
CA
Works at a financial services firm with 5,001-10,000 employees

We use it for both perimeter and internal defense.

View full review »
GC
ICT Officer at Kenyatta National Hospital

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

View full review »
JC
Systems Administrator with 201-500 employees

This solution is used to control OPC's. You are also able to generate reports with it.

View full review »
SA
Network Administrator at N S PHARMACY SDN.BHD.

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

View full review »
DR
Head of IT

Perimeter protection. It has performed well. It's good.

View full review »
CM
Head of IT Director at Cosyn Limited

I mainly use this solution for endpoint security, to capture data with a secure approach.

View full review »
PD
Associate Consult at Atos

We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard.

It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly.

Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces.

It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.

View full review »
JM
Network Security Engineer/Architect at Euronext Technologies SAS

Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.

View full review »
SM
ICT at a manufacturing company with 501-1,000 employees

We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.

View full review »
TB
System and Network Engineer at a non-tech company with 1,001-5,000 employees

We are primarily using the solution as a firewall, and for some IPS features as well.

View full review »
MF
Security Specialist at a insurance company with 501-1,000 employees

This solution is used to validate the firewalls, and it performs this function very well.

View full review »
Buyer's Guide
Check Point Security Management
April 2024
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.