Check Point Security Management Valuable Features

reviewer1986
Network Security Architect at a financial services firm with 1,001-5,000 employees
The features we like and find the most valuable are the ways we can manage the policy, create objects, and drag and drop objects in our daily operation. It makes our daily operation on the firewall management much easier than going, for example, to one firewall, then going to the other. We have a centralized point of managing the firewall in terms of firewall policy and in terms of threat prevention policy where we can easily review the antivirus policy. It has a good description of which protection we are applying to the IPS on the antivirus. It's very clear and easy to use. The SmartConsole chooses which application communicates with the manager and allows us to create the policies and also look at the log of the traffic that is crossing all the firewalls. We can manage and also see the logs of what is happening on the firewalls. View full review »
Oleg P.
Senior Network and Security Engineer at a computer software company with 201-500 employees
As the security administrator, who is responsible for the day-to-day tasks (e.g. creating new firewall rules, monitoring the security alerts and incidents etc.) and the maintenance (e.g. installing the new Jumbo Hotfixes), I find the Check Point Security Management R80.10 to be the great solution. Now everything is configured in one place - the unified SmartConsole, which helps me in saving the working time and not jumping from one console or dashboard to another constantly. The interface is cozy and modern. I especially like built-in searching capabilities - you may not just find the objects, but also see where exactly it is used across the whole security policy. Also, now the latest logs may be seen in the security policy as well, per matched rule. View full review »
Sadiq Abdulwahab
Network Administrator at Nigerian Security Printing & Minting Plc
The additional features offered by the solution are excellent. We didn't have a lot of these on a previous solution, and they've proven to be an advantage for us. Based on my personal use of the system, the interface is quite good. View full review »
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2020.
441,726 professionals have used our research since 2012.
Kirtikumar Patel
Network Engineer at LTTS
The most valuable feature for me is Identity Awareness. Earlier, we were creating policies with a machine IP-based policy. Whenever a user's machine was changed we had to manually change that machine IP to streamline the user access without their work being interrupted. That was a very hard task for me but now, with this identity awareness blade, we are creating users with their user ID. If any user changes desk location or something else, we map the user ID-based access. It is a one-time activity and we are very happy with it. View full review »
reviewer1181253
System and Network Engineer at a non-tech company with 1,001-5,000 employees
The firewall's blades are the solution's most valuable feature. View full review »
GeraldChege
ICT Officer at Kenyatta National Hospital
In terms of most valuable features, I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when. View full review »
reviewer1096398
Network and Security Manager at a tech services company with 51-200 employees
One of the most valuable features is the console application. It's a great solution for management. We can manage a lot at the same time with one security management system. Also, each gateway depends on the other, which is helpful. View full review »
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2020.
441,726 professionals have used our research since 2012.