We just raised a $30M Series A: Read our story
2018-06-24T06:46:00Z

What is your primary use case for Check Point Security Management?

1

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1010 Answers

author avatar
Top 20Real User

We use it for both perimeter and internal defense.

2021-05-18T15:54:00Z
author avatar
Top 5LeaderboardReal User

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system. Two separate packages are created for both perimeter & internal sets. We are also managing a SandBlast device via Security Management. Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

2021-03-23T07:32:00Z
author avatar
Top 5LeaderboardReal User

Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.

2020-09-27T04:10:00Z
author avatar
Top 5LeaderboardReal User

We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.

2020-09-01T08:46:00Z
author avatar
Top 5Real User

Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.

2020-07-23T17:00:00Z
author avatar
Top 20Real User

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

2020-01-26T09:27:00Z
author avatar
Top 5Real User

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

2020-01-26T09:26:00Z
author avatar
Real User

We are primarily using the solution as a firewall, and for some IPS features as well.

2019-10-06T16:38:00Z
author avatar
Consultant

This solution is used to validate the firewalls, and it performs this function very well.

2018-07-15T09:16:00Z
author avatar
Real User

Perimeter protection. It has performed well. It's good.

2018-06-24T06:46:00Z
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: December 2021.
554,676 professionals have used our research since 2012.