2019-01-31T08:49:00Z

What is your primary use case for Check Point Virtual Systems?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
88 Answers

author avatar
Top 5LeaderboardReal User

We use this solution as our perimeter firewall.

2019-09-12T09:01:00Z
author avatar
Top 20Real User

We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is. The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.

2019-09-02T05:33:00Z
author avatar
Consultant

We primarily use the solution as firewall security for our clients.

2019-08-28T09:52:00Z
author avatar
Real User

We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network.

2019-08-26T06:42:00Z
author avatar
Consultant

Our primary use case of this solution is for security.

2019-08-25T05:17:00Z
author avatar
Top 20Real User

We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers. This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.

2019-08-08T07:02:00Z
author avatar
Real User

This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution.

2019-08-04T07:38:00Z
author avatar
Top 5LeaderboardReal User

We use this solution to secure networks. We block unwanted malware.

2019-01-31T08:49:00Z
Learn what your peers think about Check Point Virtual Systems. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,517 professionals have used our research since 2012.