2019-10-06T16:38:00Z

What is your primary use case for Check Point Security Management?

1

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1212 Answers

author avatar
Top 5LeaderboardReal User

We use the solution for a distributed lean IT environment where there's a need to monitor logs, threats, and events, or requires configuring security policies within a single dashboard. It's great for customers who are searching for an upgraded top to bottom yet simple and improved log management solution. In such cases, Check Point Management works perfectly. Wherever we have provided such a solution, it has become very easy for IT administrators to manage not only a single location but also geographically distributed workplaces. It works similarly to other management software in the industry, but Check Point is far beyond all others due to its management log monitoring functionality.

2021-08-25T06:35:00Z
author avatar
Top 20Real User

We use Check Point Security Gateway GAIA R 80.40 as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode. We also use R 80.40 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow.

2021-08-25T04:48:00Z
author avatar
Top 20User

I work for one of the biggest Australian banks that rely on Check Point firewalls for security enforcement across several points in the infrastructure environment. The Security Management platform is a key component for our operation, in that it enables efficient central management for configuration and security troubleshooting. This centralised component facilitates and adds value to our daily operations, creating a single place for configurations and a platform that can present security logs that are used for the troubleshooting of security issues.

2021-07-16T04:05:00Z
author avatar
Top 5Real User

We use this solution to manage and configure all of our firewalls distributed across multiple remote locations. We can do it with a single interface where policies are created, managed, and distributed across all locations.

2021-06-16T13:31:00Z
author avatar
Top 10Real User

We use it for both perimeter and internal defense.

2021-05-18T15:54:00Z
author avatar
Top 5LeaderboardReal User

We have a Check Point firewall to secure our perimeter as well as on the internal network. We also have our Security Management server on VM. Both perimeter & internal sets are managed via the same Security Management system. Two separate packages are created for both perimeter & internal sets. We are also managing a SandBlast device via Security Management. Even though all of the work is performed by the gateway, Security Management plays a vital role in a three-tier architecture. Here, our primary use case is to push security policies & manage logs.

2021-03-23T07:32:00Z
author avatar
Top 5LeaderboardReal User

Our primary use case is to have a centralized server to manage all of our Check Point firewalls, which are around 30 clusters of firewalls. We also use it to have a place where we can see, call, and centralize the logs.

2020-09-27T04:10:00Z
author avatar
Top 5LeaderboardReal User

We are using this product on a daily basis for creating policies, managing gateways, and managing licenses. Currently, our Check Point Management Server version is R80.40. Our current use case with R80.40 is Geo policy. We have applied Geo policies to block traffic from some malicious countries such as China, but over the past few weeks, we observed suspicious activity in our logs. There are some IPs showing as Singapore-based addresses, but when we checked in details, they are showing up as IPs from China. Due to that, the traffic is being dropped as per our configuration.

2020-09-01T08:46:00Z
author avatar
Top 5Real User

Our company works in developing and delivering online gambling platforms. The Check Point Gateways are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two Check Point HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management server on a Virtual Machine (KVM), all running on R80.10 with the latest Jumbo Hotfix Accumulators installed (Take 275). The Security Management server has the following blades activated - Network Policy Management, Logging & Status, User Directory, Compliance, SmartEvent Server, Provisioning.

2020-07-23T17:00:00Z
author avatar
Top 20Real User

We primarily use the solution based on the results that are provided. We've tried others previously and they didn't give us the results we receive on this particular product.

2020-01-26T09:27:00Z
author avatar
Top 20Real User

We use it for the firewall and the filtration. The accounts are put on a server and even the SmartConsole is installed on a server environment.

2020-01-26T09:26:00Z
author avatar
Top 20Real User

We are primarily using the solution as a firewall, and for some IPS features as well.

2019-10-06T16:38:00Z
Learn what your peers think about Check Point Security Management. Get advice and tips from experienced pros sharing their opinions. Updated: September 2021.
536,244 professionals have used our research since 2012.