How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These sophisticated attacks are on mobile devices, endpoints, cloud, and various enterprise networks. They easily bypass the conventional, static detection-based systems used by organizations today. The legacy perimeter-focused security approaches have become ineffective. The outdated assumption that everything inside the security perimeter can be trusted leaves organizations exposed for vulnerability and attack. To protect the organization, we need to move up to the latest generation of cybersecurity tools. These combine real-time threat prevention, shared intelligence, and the most advanced zero-trust security across network, cloud, endpoint, and mobile devices.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
We primarily implement the solution for our clients.
We all know it's really hard to get good pricing and cost information.
Please share what you can so you can help your peers.