Check Point UTM-1 [EOL] Valuable Features

Adriano Simao
IT System Integrator at a financial services firm with 201-500 employees
The policies that you can use with this equipment are valuable. This is very nice for us; it responded to our requirements for the application to go to the internet. So, we can create a VPN for all the companies that want our service. We can create a domain to separate and segregate some functions, some services. These are the features that we are currently using right now. View full review »
Goumou Ferdinand
Security Engineer at Socitech SA
I found the batching part of Check Point very valuable. It is one part I really like about Check Point. I also like the way we connect to the monitoring. For example, in Cisco ASA we talk about FMC and we talk about like management center and the firewall. The way we get connected to the firewall is we can configure one firewall by using one management center. That approach is what I really like about Check Point because you can manage the Check Point firewall by using only one management center. One more thing about the HTTPS, the SS encryption, and decryption - that is very secure. Those are the features that make me highly recommend that the client goes with Check Point, instead of another solution. View full review »
Dcenterops677
Data Center Operations at a tech services company with 201-500 employees
The filtering was very good. View full review »
Find out what your peers are saying about Check Point, Fortinet, Sophos and others in Firewalls. Updated: August 2019.
366,486 professionals have used our research since 2012.
PedroCunha
CISO at Timestamp SGS
The UTM platform has been the most valuable. It's a great system. It has the possibility of having several plates implemented on the same appliance. Currently, several other companies have other solutions implemented, but the first time I got acquainted with this was with Check Point. View full review »
RSSI677
RSSI at a legal firm with 501-1,000 employees
The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy. View full review »
Mukesh_Sharma
System Administrator at The LNM Institute of Information Technology
The databases and its signatures are its most important features. View full review »
SeniorTech761
Senior Technology Specialist - Information Security at a tech services company with 51-200 employees
Find out what your peers are saying about Check Point, Fortinet, Sophos and others in Firewalls. Updated: August 2019.
366,486 professionals have used our research since 2012.
Sign Up with Email