How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use this solution as our perimeter firewall.
We install the solution for our customers and Check Point is our preferred solution in any firewall deployment. The two-layer architecture with the administration and security makes a difference and in every instance, we know who the user is. The touch features are very different than other brands. From the feedback I get from my customers, Check Point is the best.
We primarily use the solution as firewall security for our clients.
We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network.
Our primary use case of this solution is for security.
We are a solution reseller, and we also assist our clients with support. This is one of the solutions that we provide to our customers. This solution can be deployed in many ways. It is available in the cloud on AWS and Azure. You can install it in a virtual machine, you can have it as a hybrid, and you can have it on-premises.
This solution is very important for our network. We use it for the data on our servers and for our internet connections. We also use it for all of our user devices to connect to outside corporations. The IPS on our devices prevents any issues from occurring. We use the on-prem version of this solution.
We use this solution to secure networks. We block unwanted malware.