Check Point Web Gateway Primary Use Case
The Check Point Web Gateway is a great security asset, providing the website and application control our organization needs. You can set customized access policies to filter network traffic, restricting or even blocking access to both websites and applications when necessary.
It operates as a firewall and protects our cloud environment as an additional layer to the infrastructure. It is cloud-based, which makes its deployment very simple and easy to manage and maintain. The solution is efficient overall.
View full review »Mainly, we use the solution for the banking industry. We use it for mobile banking applications, e-commerce, and payment gateways.
View full review »Check Point is a very closed technology that filters internet traffic.
View full review »Buyer's Guide
Check Point Web Gateway
April 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
We use the solution for web traffic filtering. We also create policies to block unwanted information from going out or coming into our enterprise. We also want to understand user behavior and the type of sites the users are looking at. It gives us more security because we can block the sites that try to interfere with our network.
View full review »I use the solution to check and control the traffic.
View full review »Check Point Web Gateway was implemented in the organization as one of the main security products to avoid any malicious attack on our infrastructure.
Using this tool, we were able to increase and filter the vulnerabilities in the traffic or Internet access of the collaborators, thus preventing any type of malware from entering our network.
Implementing this web gateway in the organization helped us keep devices, applications, web security, and URL filtering secure, and with this, we have advanced a lot in security. These features are very necessary.
View full review »We had the need to protect our perimeter areas well as our applications from threats and infections in the application line directly in each of our solutions that we have managed to make available to our Market function. This is why we were looking for a solution that would allow us to innovate and protect our local network as well as the cloud and our users who constantly use these application-based solutions.
View full review »Given the current security landscape, we have sought solutions that allow us to protect our users and our web pages, to protect us against malware or against web threats or fake pages, as, in some cases, users find it difficult to identify threats or fakes.
Given this need and the experience we have had with other solutions, we sought an integration that allows us to help improve the efficiency and responsiveness of the security team. We needed a consolidated view of security in the cloud. This solution allows us, the administrators of the company, to quickly identify threats and security configuration problems in the cloud and take actions to remediate them.
View full review »SF
reviewer2008410
Software Engineer at Doddle
Protection of the company websites has been the most important goal that we have been chasing. Check Point Web Gateway blocks malicious attacks on our websites that can lead to data losses. The multilayered security architecture detects any form of malware attacks in advance with immediate solutions. Working with safe websites has enhanced the full production potential for our working systems. This platform provides reliable data analytics that has enabled each team to plan and set achievable goals.
View full review »We were searching for a solution that would allow the company to have protection against various problems, such as application identity and its characteristics, and to understand and prevent malware. The solution allows users to block various types of incidents that could attack any organization and see any insecurities. It prevents exploitation attacks in a safe way. Regardless of the type, it helps us to prevent malicious traffic and the interruption or loss of information via access.
View full review »Our primary use for Check Point Web Gateway is network security.
View full review »Roaming users use the secure web gateway. We also use the tool for application filtering and web filtering.
KP
Kirtikumar Patel
Network Engineer at LTTS
We have the Check Point Firewall as a perimeter gateway and we are using it across seven geolocations. Each location has a cluster. We use it to block high-risk and malicious websites and applications. It enforces compliance policies and regulations at each of the sites.
With this Web gateway, we are secure and it protects our applications or URL with multi-layer architecture security. We are using web security, URL filtering, and antivirus, and we will enable the HTTPS inspection shorty.
View full review »We needed to be able to filter traffic, to avoid consumption of resources, and to avoid loss of unnecessary bandwidth so we can use the resources correctly.
We needed to control sites since some consumptions do not represent and should not be allowed within the network by the company. Creating policies to be able to segment, allow, and block depending on the profiles created has been helpful.
We also needed to validate the access behavior through monitoring to determine what additional rules we could provide to improve security.
View full review »LD
Leo Diaz
Cloud Support at a tech company with 1-10 employees
Protecting us from advance threats, malware, phishing, and ransomware gave us the initiative to contact our checkpoint vendor and show interest in a tool that could satisfy this need.
Then we were allowed to try this type of tool and see the results.
Our main motivation for using this type of tool was to improve the level of security and effectiveness by preventing or protecting the company from threats on sites and applications that could compromise the company's information and equipment.
View full review »It helps in establishing a site-to-site VPN with our on-premise firewall. We also use it to protect our cloud environment and layering protection for our cloud data centre.
View full review »Many of our clients use Check Point Web Gateway as a cloud base, firewall, and DPI for their security assets. All of this is deployed on the cloud. Because we are the service provider, we can use the SDN technology to connect to our customer and take the traffic to the Check Point cloud.
View full review »JH
JB Hooda
Director at Progression Infonet Pvt Ltd
It is primarily used for highlighting the threats that are coming from various locations. We are using its latest version.
View full review »Our primary use case for this solution is as firewall and, because I'm a student, when I work on my studies.
View full review »Buyer's Guide
Check Point Web Gateway
April 2024
Learn what your peers think about Check Point Web Gateway. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.