Check Point Security Management Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
David Roy
Real User
Head of IT
Aug 05 2018

What is most valuable?

The ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN. Those are the main features we use.

How has it helped my organization?

It hasn't really improved the way our organization functions. It has just provided that extra functionality. That is something we now demand of all… more»

What needs improvement?

I would like the ability to have an overview, cross-site: One portal that does all firewalls.

If you previously used a different solution, which one did you use and why did you switch?

There was no previous solution. I inherited this one. When selecting a vendor, the most important criteria are history, reputation, and looking at… more»

What other advice do I have?

Do the homework because Check Point is rather expensive. There are better firewalls on the market now that are cheaper and provide better… more»
Mario Figueiredo
Consultant
Security Specialist at a insurance company with 501-1,000 employees
Aug 05 2018

What is most valuable?

URL filtering is a very important feature.

How has it helped my organization?

It helps us control what people are accessing, inside the company.

What needs improvement?

The usability of the solution could be improved.

If you previously used a different solution, which one did you use and why did you switch?

In the past, we had a type of proxy for our URL filtering. The idea was to have everything packaged in the same solution. We removed the proxy and… more»

What other advice do I have?

Pay attention to the stability of the solution because it's very critical. I would rate this solution a nine out of 10. They need to improve the… more»

Articles

User Assessments By Topic About Check Point Security Management

Find out what your peers are saying about Check Point, Fortinet, AT&T and others in Log Management. Updated: May 2019.
339,601 professionals have used our research since 2012.

Check Point Security Management Questions

Check Point Security Management Projects By Members

What is Check Point Security Management?

Check Point R80.10 Security Management sets the standard for reliability and ease-ofuse in security management. From policies and operations to people and technology, its future-proof design anticipates your security needs. It consolidates all aspects of your security environment seamlessly so you can deploy the strongest protections across your organization effectively and efficiently – without impeding business innovation.

Also known as
R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
Check Point Security Management customers

Hedgetec, Geiger


Sign Up with Email