We just raised a $30M Series A: Read our story
2018-07-21T08:18:00Z

What is your primary use case for Check Point NGFW?

8

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
7474 Answers

author avatar
Top 5Real User

We use this product for providing perimeter security, as well as advanced threat protection capabilities to critical infrastructure. The solution is expected to deliver high-performance throughput for voluminous traffic continuously. We are using these gateways for multiple functionalities such as: * Perimeter Gateways * Anti - APT (Advanced Persistent Threat) * Anti Malware / Anti Virus * SSL Inspection * Network Intrusion Prevention System * Private Threat Cloud All of our solutions are expected to run in high availability and have good resiliency.

2021-05-10T14:21:00Z
author avatar
Top 5Real User

We use this solution for complete protection against advanced zero-day threats with Threat Emulation and Threat Extraction. We also use: * NSS Recommended IPS to proactively prevent intrusions * Antivirus to identify and block malware * Anti-bot to detect and prevent bot damage * Anti-Spam to protect an organization's messaging infrastructure * Application Control to prevent high-risk application use * URL Filtering to prevent access to websites hosting malware * Identity Awareness to define policies for user and groups * Unified Policy that covers all web, applications, users, and machines * Logging and Status for proactive data analysis

2021-05-08T13:39:00Z
author avatar
Top 5Real User

Our primary use case is as a perimeter firewall for main and DR sites for a financial institution. It secures Internet access for users through IPS/AV/Threat Emulation/Application control and URL filtering with HTTPS inspection and geolocation restrictions. It secures our email and MDM solutions. We also use it to create site-to-site VPNs with vendors. Remote access is achieved through the use of a secure workspace and SSL network extender. Securing and inspecting HTTP traffic to our web servers is another important task. It secures several DMZs and segregates them from the rest of the network. We use all of the security features available.

2021-05-07T14:36:00Z
author avatar
Top 5Real User

I'm a consultant at a Check Point partner. I have deployed a lot of Check Point firewalls and support Check Point firewalls for our customers. Our customer environments are different. I have deployed standalone, cluster, and two-layered firewalls.

2021-05-06T16:40:00Z
author avatar
Top 5Real User

We have a pretty small office and therefore, a small network environment, and the SMB appliances from Check Point were a perfect fit and exactly what we were looking for in order to improve our overall security posture in the office. It was critical for us to be able to secure our network, including intrusion detection and prevention along with threat emulation and extraction for zero-day threat help, and Check Point fit perfectly. After implementing the solution, we were able to get through a third-party penetration test of our network without issue.

2021-05-05T19:37:00Z
author avatar
Top 5Real User

The role NGFW plays is to protect the organization against Layer 7 network attacks. The solution has helped us to guard our perimeter security on a wider level. This is not like plain vanilla firewall. We have got a wider visibility with the help of this next-generation firewall; it shows us the traffic flowing across the network and based upon that, we have made the modifications required to restrict access. Also, the active cluster module has helped us to balance the load during peak hours. Since moving to the active-active module, we have got the much-needed breathing space.

2021-03-29T13:23:00Z
author avatar
Top 5LeaderboardReal User

The primary use is to protect the organization from any kind of attack. It is able to isolate, secure, and control every device on the network at all times. Solutions should have the ability to block infected devices from accessing corporate data and assets. It provides access to the Internet for corporate resources in a secure manner. Our resources are used to host applications and services that are accessible to end-users over the Internet. It is used to provide required/limited access for third parties who want to connect to our corporate network. Access is granted based on application type and should be independent of port or protocol. It provides next-generation protection including IPS/Web Filtering/SSL decryption and more. It offers centralized policy management capabilities for all firewalls.

2021-03-29T10:19:00Z
author avatar
Top 5Real User

Nowadays, there are many threats and it's necessary to have an automatic process to defend your organization. The Check Point NGFW is a good solution for this use case.

2021-03-22T10:00:00Z
author avatar
Top 10Real User

The purpose of using the firewall is to protect the users from the external network, internet. Apart from that, we have set up IPsec tunnels between two different sites, and for internal usage, between two different zones, we use these firewalls as well. Our environment consists of a 3-tier architecture, which is recommended by Check Point. We use the central management system to manage our 3-tier architecture, and we use the Smart Console as well.

2021-03-04T01:49:00Z
author avatar
Top 10Real User

We use this firewall to protect the internal network and to set up the IPSec standard from one location to another.

2021-03-02T19:08:00Z
author avatar
Top 5LeaderboardReal User

We use this solution as a layer 3/4 firewall deploying access rules in our DMZ. We have more than six different centers with different service layers, a core of up to 500Gb per site, and other service centers providing security for all inbound and outbound connections. VSX gives us the capacity to consolidate hardware in fewer devices, reducing the OPEX, and creating different VFWs to provide service to different environments or services. Layer 7 features allow us to upgrade our security services. Activating the required features only requires upgrading the license.

2021-03-02T15:18:00Z
author avatar
Top 5LeaderboardReal User

In today's world, we can't completely rely on traditional signature-based devices, as technology involving cyberattacks is becoming more sophisticated. We require an all-in-one solution that can defend against newly-created attacks, necessitating the usage of NGFW firewalls. This is where Check Point comes into the picture. Our environment contains multiple roaming users, where we have to extend trust beyond the organizational network. Not only is there east-west traffic to deal with, but a large volume of north-south traffic, as well. We are required to monitor all of the traffic, which includes many branch offices connected centrally. Monitoring Data via DLP in such a scenario, we require a single solution, which is nothing but Checkpoint.

2021-02-26T11:13:00Z
author avatar
Top 10Real User

I work as an internal network team member. We protect the company environment from outside threats, outside viruses, and ransomware attacks. It is kind of an IT administrator job. They are protecting internal security as well as giving us security from the outside world or public environment.

2021-02-18T22:07:00Z
author avatar
Top 10Real User

We use firewalls to protect our private environment from the public environment. My IT group is in charge of protecting the environment and maintaining safe usage of the internet. This product gives us a better, safer solution for the users within our company.

2021-02-17T11:56:00Z
author avatar
Top 5Real User

The main use case is Firewall provisioning and integration with Tufin and Skybox. Also, we focus on firewall compliance, rule review, VPN configuration, and network troubleshooting.

2021-01-18T10:55:00Z
author avatar
Top 10Real User

We use Check Point firewalls to secure our internal network from the outside world and to provide a good, comfortable, and secure environment for our employees. We have various models from the R80 series, such as the R80.10 and the R80.30.

2020-12-14T06:56:00Z
author avatar
Top 10Real User

We have two clusters. We are using them as both perimeter firewalls and data center firewalls.

2020-11-15T06:39:00Z
author avatar
Top 10Real User

We use the solution to protect our organization and workers from the outside Internet or any untrusted network. We have the three-tier architecture of Check Point. We use its consoles, central management system, and firewall device for managing it. This three-tier architecture is recommended by the Check Point Community.

2020-11-09T08:11:00Z
author avatar
Top 10Real User

We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world. I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances.

2020-10-13T07:21:00Z
author avatar
Top 10Real User

Our primary use cases for Check Point NGFW are for perimeter security and content filtering for browsing behavior.

2020-10-04T06:40:00Z
author avatar
Top 20Real User

The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.

2020-09-27T04:10:00Z
author avatar
Top 10Real User

We're using Check Point Next Generation Firewalls to secure the internal LAN network from unwanted threats and for protecting the environment for business use.

2020-09-27T04:10:00Z
author avatar
Top 10Real User

In my previous company, one of the clients was a big chocolate company. They had this payment card infrastructure (PCI), where they needed to have auditors from PCI check the firewalls to see if everything was okay. So, they had web-based authentication. I'm working with the 5800, 5600, and 5200 models. I work with the UTMs as well. These are physical appliances as well as open servers.

2020-09-23T06:10:00Z
author avatar
Top 10MSP

We use it to protect our network from the outside world and unsecured networks. We also use it to provide a safe, secure network to the internal users of our organization. I am using various versions on the model, like R80.10 and R80.30.

2020-09-22T07:16:00Z
author avatar
Top 20Real User

Check Point protects our environment from external threats. In particular, we use: * Application Control for Internet access * HTTPS Inspection for outgoing connections into the internet * Separate the OT network from the normal data LANs * SSL VPN for End Users - Check Point Mobile VPN Client is used on the end-user clients * Site-to-Site VPN for connecting other companies to our environment We are using two Check Point boxes in a ClusterXL Setup so that one appliance can die and the environment is not affected. We also use a cloud gateway for internet security on users, which are only connected to the internet (outside the office).

2020-09-15T09:02:00Z
author avatar
Top 10Real User

I support multiple clients within the UK, the EMEA region, the US, and now in Asia Pacific as well. I specialize in Check Point firewalls. I design and secure their data centers, their on-premises solutions, or their businesses security. The firewalls are mostly on-premise because most of our clients are financial organizations and they have strict compliance requirements. They feel more secure and have more control when things are on-premise in the data center. However, there are use cases where I have helped them to deploy Check Point solutions in the cloud: AWS, Azure, and in Google as well. But cloud deployments are very much in the early stages for these clients, on a development or testing basis. Most of the production workloads are still on-premise in data centers. Most of my customers are still using R77.30, and they are on track to upgrade from that to R80, which is the current proposed version by Check Point.

2020-09-14T06:48:00Z
author avatar
Top 5Reseller

It's an on-prem deployment where we use it to protect our client and end-users who are working with the internet, and to protect their servers from external access. They have about 100 users and two servers.

2020-09-14T06:48:00Z
author avatar
Top 10Real User

We use it as a normal firewall for perimeter security, using some of the Next Generation features, like Anti-Bot and Antivirus. We have two ISPs. We have a different firewall system in front of the Check Point Firewall. We also have normal Cisco switches combined with the Check Point solution. Then, our internal network is with Cisco, which is about 300 servers and 1,500 clients.

2020-09-13T07:02:00Z
author avatar
Top 5Real User

We recommend to clients who are installing applications that they can work with Check Point Next Generation Firewalls. Our role is to support our customers in terms of their migration, firewall room cleanups, and implementing all the security features that the firewall has. Our clients have branch offices in Mexico and Bermuda. Check Point is one of the top names in these areas.

2020-09-10T07:35:00Z
author avatar
Top 10Real User

We use them to protect our edge infrastructure and for interconnecting our sites using the VPN.

2020-09-09T06:29:00Z
author avatar
Top 5LeaderboardReal User

The primary use is to segregate the environment internally to create a lab environment and a production environment, for example. We also use them to protect the company from the internet and when going to the internet; to protect the perimeter of the company. We use them to create a VPN with customers and clients, and with the other companies that belong to the group. We work with 1200s, 1500s, 4000s, and 5000s.

2020-09-09T06:29:00Z
author avatar
Top 20Real User

We provide solutions for various customers where we apply Check Point Firewalls, either for a VPN gateway or for securing their networks. We have provided them to a couple of financial customers to protect their mobile banking as well.

2020-09-08T05:15:00Z
author avatar
Top 5Real User

We use it for VSX virtualization and we use it for normal firewall functions as well as NAT. And we use it for VPN. We don't use a mobile client, we just use the VPN for mobile users.

2020-09-07T05:57:00Z
author avatar
Top 5Real User

The primary use of the firewall is to allow or block some traffic. Mainly, it is the perimeter firewall for the Internet. It filters the traffic from external to internal, e.g., to secure the traffic. Some of our customers have been demanding Check Point as their firewall product. I do the installation, support, firewalls, etc.

2020-09-07T05:57:00Z
author avatar
Top 5MSP

For the SMB appliances, the use case is tricky because I don't actually like them too much. If you have a very small branch office, you could use one of them, but in that case I would just go for the lowest version of the full GAiA models. But for small locations that are not that important, it is possible to use one of the SMB appliances, the 1400 or 1500 series. The full GAiA models, starting with the 3200 and up to the chassis, are the ones we work with the most, and you can use them in almost every environment that you want to secure, from Layer 4 to Layer 7. The only reason to go higher is if they don't perform well enough, and then you go to the chassis which are for really big data centers that need to be secure. About a year or a year-and-a-half ago, they introduced the Maestro solution, which gives you the flexibility of using the normal gateways in a way that you can extend them really easily, without switching to the chassis. You can just plug more and more gateways into the Maestro solution.

2020-09-06T08:04:00Z
author avatar
Top 5Real User

I had 3200 appliances deployed in my company where we had two CMSs. We had multiple VSXs on those appliances due to the main firewall that we had on the VLAN. We also had an external firewall on the VLAN, which were used to monitor and allow the traffic within the network. That is how we were using it. They have a new R81 in place. Currently, they also have R75 deployed in the environment, but they are planning to upgrade to R80.20 because that particular firewall has very high CPU utilization and there is no more support for R75.

2020-09-06T08:04:00Z
author avatar
Top 5Real User

We are mainly using it for policy installation and access purposes. We have a bank project where we are using mobile access, Antivirus, and IPS. These are all are configured on the Check Point Firewall, where we are using it on a daily basis. I have worked on the following firewall series and models: * 15000 * 23900 * 41000 * 44000. I have worked on the following versions: * R77.30 * R80.10 * R80.20. I am currently working on the R80.20 version and the hardware version is from the 23000 series.

2020-09-03T07:49:00Z
author avatar
Top 10Consultant

We work with these firewalls for overall security, including content filtering.

2020-09-03T07:49:00Z
author avatar
Top 5Real User

We use several of the blades. We use it for regular access control, but we also use the application control. We use HTTPS inspection and threat prevention. We use the Mobile Access blades as well IPS. We have a Smart-1 205 as our management server and for the gateway we've got 3200s.

2020-09-02T06:45:00Z
author avatar
Top 10Real User

We use Check Point's firewall to provide network security to our organization as well as to other, third-party vendors.

2020-09-01T05:25:00Z
author avatar
Top 10Real User

We use it to provide security in our organization. Check Point Next Generation Firewalls are designed to support large networks, like a telco environment.

2020-08-30T08:33:00Z
author avatar
Top 10Real User

We use it to provide security to our environment from the outside world. We are using it to provide security against vulnerabilities using threat prevention, Antivirus, and IPS.

2020-08-30T08:33:00Z
author avatar
Top 10MSP

My role is to do implementation and troubleshooting on the Check Point Firewall. We use this firewall for our organization's security by adding restrictions and security from viruses and other tech from the external Internet. It is used in our internal company-wide network. It protects our company throughout the LAN network.

2020-08-27T07:02:00Z
author avatar
Top 5Real User

The reason we have the Check Point Next Generation Firewall is that it's our main perimeter firewall in all our branches around the world. It secures the IT infrastructure in all of our environments and our subsidiaries. We also use it to set up tunnels between all our sites. We have multiple versions from the legacy R77 to the latest R80.40.

2020-08-19T07:57:00Z
author avatar
Top 10Real User

I am using this solution for perimeter security in the company. Our firewall security is centralized under one management. Also, we use this firewall to manage some of the VPN clients and the employees' access across the company. Each firewall is capable of using the VPN client, but we only use two. We have five in total, but we only use two for these issues. I am using the firmware version for the operating system. The blades are firewalled for IPS and mobile access.

2020-08-12T07:01:00Z
author avatar
Top 5Real User

We use Check Point NGFW as a perimeter NAT Gateway with the security features, it helps us to prevent hackers. We implement Check Point-based infrastructures for our customers. In most cases, this is the same perimeter gateway and internal segmentation firewalls. Many of our customers also using the VPN feature to organize remote access to the company's assets for employees, especially in the COVID period, and to connect their branch offices to the base infrastructure. Environments are differing from one out customer to another, but these are primary use cases.

2020-08-02T13:27:00Z
author avatar
Top 5LeaderboardReal User

I have been using this solution since the GAIA OS R77 was there. I am using it for my day to day access such as policy creation, policy modification, and also regularly policy disabling and deletion. I have 17K+ users in my organization, 100 + client to site VPN and I have a number of S2S as well. My daily job is health checkup, security log monitoring and incident management, daily IPS checks, threat presentation reports and to analyze the risk and take necessary action on that as well.

2020-07-30T10:05:00Z
author avatar
Top 10Real User

Check Point NGFW is being used as a security product in the environment. It is securing the IT infrastructure and delivering the services as expected. In the current world scenario, IT is becoming the backbone for every organization, and most business is highly dependant on IT so securing the IT infrastructure is becoming challenging. Check Point NGFW meets the expectations of our organization to secure the IT infrastructure as per organizational need. Check Point NGFW also gives many security features in single box which reduce your management complexities.

2020-07-29T19:59:00Z
author avatar
Top 5LeaderboardReal User

*Perimeter Firewalls - to protect regional hubs and local offices from public space and provide L3-L7 filtering *Internal Segmentation Firewalls - to secure company's internal network from movement of malicious actors and reduce traffic flows only to authorised ones *Public and Private Cloud - to secure hybrid environment either onprem or in the cloud while achieving micro segmentation per host *Cloud Compliance - to get a visibility into cloud environment and and related vulnerabilities *Data Center *SaaS

2020-07-28T14:42:00Z
author avatar
Top 20Real User

The firewall is the primary use case of this solution & IPS is secondary use case of the solutions. We are looking forward to Sandblast solutions. We also use it for cloud expansions The Check Point NGFWs brought up the security level with the help of the advanced software blades - we use Application Control, URL Filtering, IPS, Anti-Bot, and Antivirus. The setup was simple, and the performance is great - we have significant resources to expand the environment in the future without disabling any blades and thus maintaining the security on the same, high level.

2020-07-28T09:29:00Z
author avatar
Top 5LeaderboardReal User

Check Point leading industry provides a complete solution that is required to perimeter security along with deep packet inspection for network traffic. Check Point not only acts as a traditional firewall but it provides you with complete security for users who work from home. Work from home users observed that Check Point gives 100 % functionality without any trouble. It offers centralized management to customers where they have an IT member so there Check Point management can work properly. It is available in a smaller range to higher. Customers can get it at an affordable price.

2020-07-27T11:07:00Z
author avatar
Top 5LeaderboardReal User

The Check Point Next-Generation is a firewall that provides security to our inside network from the outside with next-gen features like Blocking Antibot, Antivirus, IPS, etc. Other than that, Check Point supports threat prevention for zero-day attacks. With the addition to that Check Point firewall, it also provides a VPN. We can configure Star and Mesh IPSec VPN as well as SSL VPN. Logging and reporting is one more important aspect when we talk about firewalls and Check Point did a great job in that.

2020-07-23T14:53:00Z
author avatar
Top 5Real User

Our company works in developing and delivering online gambling platforms. The Check Point NGFWs are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Clusters serve as firewalls for both inter-VLAN and external traffic.

2020-07-23T10:53:00Z
author avatar
Top 20Real User

We use it for standard firewalls.

2020-07-22T08:17:00Z
author avatar
Top 10Real User

It is a typical firewall that has been implemented in most of our regions. We use it for normal firewall policies and VPNs. We are mainly using Check Point firewalls. We also have a few Check Point cloud security programs.

2020-07-22T08:17:00Z
author avatar
Top 5Reseller

We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices. Atos provides this solution, including network design and advice.

2020-07-14T08:15:00Z
author avatar
Top 20Real User

We primarily use this solution for routing and the protection of our internal corporate network.

2020-06-28T08:51:00Z
author avatar
Top 10Real User

Our primary uses for the Check Point NGFW are network segmentation, identity awareness, and application control.

2020-06-28T08:51:00Z
author avatar
Top 10Real User

We are a system integrator and the Check Point Next-Generation Firewall is one of the solutions that we implement for our clients. It is primarily used for data protection, VPNs, and sandboxing. We also use it in our own data center.

2020-06-25T10:49:23Z
author avatar
Top 10Consultant

I am a Check Point distributor and the Next-Generation Firewall is one of the products that I am dealing with. My customers use this as part of their security solution that covers mobile devices, computers, their network, cloud, SD-WAN, IoT devices, IP phones, IP cameras, and others.

2020-06-17T10:55:58Z
author avatar
Top 5Real User

We have a big environment with nearly fifteen multi-vendor clusters. We are using firewalls mainly for layer three access rules. But nowadays, application-layer-based security and threat prevention are also important. We are using IPS and antivirus blades actively, too. In the Intrusion Prevention System blade, we are using a lot of different signatures and actions according to the impact, severity, and cost of the specified signature. The antivirus blade is also in the same logic as the Intrusion Prevention System.

2020-02-17T15:12:00Z
author avatar
Top 20Real User

We use Checkpoint Firewalls to protect Datacenter VLANs against each other. In addition, we use them to protect our perimeter systems from the internet, and our internal network from the perimeter. We have virtualized the systems on a VSX-Cluster using VSLS, but the basics are still the same compared to a traditional cluster. VSX gives us a bit more flexibility in the case of load-sharing. Therefore, it’s quite easy to react in the case of heavily used hardware distributing the load by failover or prioritizing VSs onto different nodes.

2020-02-10T14:40:00Z
author avatar
Top 5Real User

This is a complex high availability solution growing by over 100% per year. The complexity of the business environment made the ability to increase capacity without having to remove previous hardware much easier. We have a large online presence with users needing realtor access to our environment.

2020-02-07T20:14:00Z
author avatar
Top 10Real User

The Check Point NGFW is the best product that I have ever used. It has pluses and minuses, as do others, but the usability, simplicity, and the configuration abilities are very user-friendly. After a while, other vendors just don’t come close to it. The second thing is that is just works and it does it with ease. The upgrades and bug fixes are frequent and well documented. Also, the patches just work ;-) There are some negatives but as I already said, they aren’t many and from my point of view, we can see past them.

2020-02-06T11:13:00Z
author avatar
Top 20Real User

We use this solution for our perimeter firewall to protect our web applications, systems, and network. We are running our complete business with Check Point. The complete traffic is managed by Check Point. The Check Point threat emulation blade is enabled to protect zero-day attacks and it will detect and prevent attachments and other payloads from this type of attack.

2020-01-14T11:08:00Z
author avatar
Reseller

The management of our company requires a firewall implementation. We use Check Point to complete the network compliance rules.

2019-07-02T11:50:00Z
author avatar
Top 20Real User

We primarily use the solution as a firewall device and for our VPN.

2019-06-24T12:13:00Z
author avatar
Real User

* Perimeter and datacentre firewalls * URL filtering * Anti-bot * Anti-malware * Application awareness.

2019-03-19T20:44:00Z
author avatar
Real User

Our primary use case of this solution is to use it as a security gateway.

2019-02-03T08:25:00Z
author avatar
Real User

Check Point is a very good solution. My primary use case is as a perimeter firewall. I never use Check Point's IPS. I always work with another IPS, in a different appliance. I always use the firewall modem as a firewall.

2019-01-24T13:13:00Z
author avatar
Real User

We use this product as firewall protection.

2019-01-17T10:53:00Z
author avatar
Real User

It is our next-generation firewall and IPS.

2018-08-07T08:19:00Z
author avatar
Real User

It's simply a firewall.

2018-08-01T07:08:00Z
author avatar
Real User

We are a large University with more than 1000 employees across seven faculties and growing. Student population is more than 15,000 in-house and 30,000 external. The University of Kelaniya Sri Lanka primarily uses the Check Point 4800 device to protect users and servers. The product also enables the VPN with advanced security policies inside our network. This gives us a better security posture. Valuable features include a good VPN, IPsec, and SSL. We use Check Point 4800 as a perimeter firewall and our internet bandwidth expanded to 1Gbps.

2018-07-21T08:18:00Z
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,529 professionals have used our research since 2012.