Check Point Virtual Systems Primary Use Case

Siju Siju
Assistant Manager IT Projects at Mustafa Sultan
We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is. The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best. View full review »
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution that we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Virtual Systems are activated on the NGFWs to logically divide the firewall into two parts. One is for serving internal, intra-VLAN traffic, and the other is for serving the external traffic coming from the Internet. View full review »
Anatolii Kachanovskyi
Head of Cyber Security Department at NGT Group
We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network. View full review »
Learn what your peers think about Check Point Virtual Systems. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,194 professionals have used our research since 2012.
reviewer1033941
CTO at a healthcare company with 10,001+ employees
We use this solution as our perimeter firewall. View full review »
it_user715161
Director at InfoGuardian
We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers. This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises. View full review »
Nhlanhla Nhlapo
Consultant at a government with 10,001+ employees
We primarily use the solution as firewall security for our clients. View full review »
NtwrkSec67
Network and Security Manager at a financial services firm with 1,001-5,000 employees
This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution. View full review »
Rakesh Rawat
Network Engineer at Acliv Technologies Pvt Ltd
We use this solution to secure networks. We block unwanted malware. View full review »
Ntwrkconslt564
Network Consultant Engineer at a tech services company with 11-50 employees
Our primary use case of this solution is for security. View full review »
Learn what your peers think about Check Point Virtual Systems. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,194 professionals have used our research since 2012.