Check Point UTM-1 [EOL] Valuable Features
Check Point UTM-1 has several valuable features that have given prestige to the tool in the field of security, some of which are:
Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access.
Intrusion prevention detects and blocks all vulnerabilities that occur in the company.
The VPN provides an excellent secure way to connect outside the company.
Finally, it offers reports and management, which allows Check Point UTM to manage the entire security environment safely.
View full review »The most outstanding feature is being able to centralize each of the functions in a single device. Yet, the evolution and the changes that are taking place day by day have allowed us to do medium deep packet inspection - and a solution that obtains greater visibility is the new product that Harmony is offering us.
The feature that was previously unique and exclusive to Check Point UTM has become part of the solution. They've been updating this feature and have been molding a product that was previously its own product into a single solution.
View full review »Check Point is the brand that invented customer centricity when it comes to network security. SmartDashboard was there before many competitors were pushing administrators to the CLI, even for the simplest tasks. The ability to create a central database for objects (sources, destinations, services, etc.), which can be used in several different policies, and the possibility of browsing all logs (FW, IPs, identity awareness, etc.) from all the gateways from a unique screen are big pluses.
View full review »Buyer's Guide
Check Point UTM-1 [EOL]
April 2024
Learn what your peers think about Check Point UTM-1 [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
The filtering was very good.
View full review »- Reliability
- Performance
- Security
AS
Adriano-Simao
Chief Technology Officer at Triana Business Solutions Lda
The policies that you can use with this equipment are valuable. This is very nice for us; it responded to our requirements for the application to go to the internet. So, we can create a VPN for all the companies that want our service. We can create a domain to separate and segregate some functions, some services. These are the features that we are currently using right now.
View full review »GF
GoumouFerdinand
Security Engineer at SOCITECH S.A.
I found the batching part of Check Point very valuable. It is one part I really like about Check Point. I also like the way we connect to the monitoring. For example, in Cisco ASA we talk about FMC and we talk about like management center and the firewall. The way we get connected to the firewall is we can configure one firewall by using one management center. That approach is what I really like about Check Point because you can manage the Check Point firewall by using only one management center.
One more thing about the HTTPS, the SS encryption, and decryption - that is very secure. Those are the features that make me highly recommend that the client goes with Check Point, instead of another solution.
View full review »- Firewalls
- IPS
The UTM platform has been the most valuable. It's a great system. It has the possibility of having several plates implemented on the same appliance. Currently, several other companies have other solutions implemented, but the first time I got acquainted with this was with Check Point.
PB
RSSI677
RSSI at a legal firm with 501-1,000 employees
The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy.
View full review »The most important features are performance and ease of management.
MS
Mukesh_Sharma
System Administrator at LNMIIT
The databases and its signatures are its most important features.
View full review »- Firewall
- Mobile Access
- Application Filtering
- URL Filtering
- IPS
- Mobile access
- Proxy
- Load balancing
- VPN
- Firewall
- IPS
- Threat prevention
- IPS
- Application Control and URL filtering
- SSL VPN
- Mobile Access
- Anti Spam
- Firewall & VPN are the most valuable
- Data Loss Prevention (in higher models like 12000 series)
- Endpoint, IPS
- Application and URL Filtering
- Threat prevention & anti-Spam and mail
IPSec VPN is valuable for us. We have quite a few remote sites that need access to our core data network. It is easy to set up and use.
View full review »Sandboxing.
View full review »Buyer's Guide
Check Point UTM-1 [EOL]
April 2024
Learn what your peers think about Check Point UTM-1 [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.