2018-07-21T08:18:00Z

What is your primary use case for Check Point NGFW?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
1414 Answers

author avatar
Top 5LeaderboardReal User

We have a big environment with nearly fifteen multi-vendor clusters. We are using firewalls mainly for layer three access rules. But nowadays, application-layer-based security and threat prevention are also important. We are using IPS and antivirus blades actively, too. In the Intrusion Prevention System blade, we are using a lot of different signatures and actions according to the impact, severity, and cost of the specified signature. The antivirus blade is also in the same logic as the Intrusion Prevention System.

2020-02-17T15:12:00Z
author avatar
Top 10Real User

We use Checkpoint Firewalls to protect Datacenter VLANs against each other. In addition, we use them to protect our perimeter systems from the internet, and our internal network from the perimeter. We have virtualized the systems on a VSX-Cluster using VSLS, but the basics are still the same compared to a traditional cluster. VSX gives us a bit more flexibility in the case of load-sharing. Therefore, it’s quite easy to react in the case of heavily used hardware distributing the load by failover or prioritizing VSs onto different nodes.

2020-02-10T14:40:00Z
author avatar
Top 5Real User

This is a complex high availability solution growing by over 100% per year. The complexity of the business environment made the ability to increase capacity without having to remove previous hardware much easier. We have a large online presence with users needing realtor access to our environment.

2020-02-07T20:14:00Z
author avatar
Top 10Real User

The Check Point NGFW is the best product that I have ever used. It has pluses and minuses, as do others, but the usability, simplicity, and the configuration abilities are very user-friendly. After a while, other vendors just don’t come close to it. The second thing is that is just works and it does it with ease. The upgrades and bug fixes are frequent and well documented. Also, the patches just work ;-) There are some negatives but as I already said, they aren’t many and from my point of view, we can see past them.

2020-02-06T11:13:00Z
author avatar
Top 10Real User

We use this solution for our perimeter firewall to protect our web applications, systems, and network. We are running our complete business with Check Point. The complete traffic is managed by Check Point. The Check Point threat emulation blade is enabled to protect zero-day attacks and it will detect and prevent attachments and other payloads from this type of attack.

2020-01-14T11:08:00Z
author avatar
Reseller

The management of our company requires a firewall implementation. We use Check Point to complete the network compliance rules.

2019-07-02T11:50:00Z
author avatar
Top 5LeaderboardReal User

We primarily use the solution as a firewall device and for our VPN.

2019-06-24T12:13:00Z
author avatar
Real User

* Perimeter and datacentre firewalls * URL filtering * Anti-bot * Anti-malware * Application awareness.

2019-03-19T20:44:00Z
author avatar
Real User

Our primary use case of this solution is to use it as a security gateway.

2019-02-03T08:25:00Z
author avatar
Top 20Real User

Check Point is a very good solution. My primary use case is as a perimeter firewall. I never use Check Point's IPS. I always work with another IPS, in a different appliance. I always use the firewall modem as a firewall.

2019-01-24T13:13:00Z
author avatar
Real User

We use this product as firewall protection.

2019-01-17T10:53:00Z
author avatar
Real User

It is our next-generation firewall and IPS.

2018-08-07T08:19:00Z
author avatar
Real User

It's simply a firewall.

2018-08-01T07:08:00Z
author avatar
Top 5LeaderboardReal User

We are a large University with more than 1000 employees across seven faculties and growing. Student population is more than 15,000 in-house and 30,000 external. The University of Kelaniya Sri Lanka primarily uses the Check Point 4800 device to protect users and servers. The product also enables the VPN with advanced security policies inside our network. This gives us a better security posture. Valuable features include a good VPN, IPsec, and SSL. We use Check Point 4800 as a perimeter firewall and our internet bandwidth expanded to 1Gbps.

2018-07-21T08:18:00Z
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,845 professionals have used our research since 2012.