Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Security Management

Check Point Software Technologies

Reviews from AWS customer

4 AWS reviews

External reviews

48 reviews
from and

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    Ruben Cordero

Centralized policies have streamlined operations and improved incident response across multiple environments

  • November 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is for centralizing my different gateways in different sites, such as Azure, on-premise, and other clouds, which allows me to control, see events, and make different policies over my security in different sites at the same time.

Managing those different sites with Check Point Security Management is much easier because the policies can be applied centrally and pushed out across Azure, on-premise, and other cloud environments, allowing me to update changes in one management console that automatically syncs everywhere, which saves time and avoids inconsistency. Monitoring events is also streamlined since all logs and alerts feed into the single dashboard.

One unique aspect of our setup with Check Point Security Management is how we manage policies across both traditional on-premise firewalls and multiple cloud environments simultaneously, relying on a centralized console to push consistent rules everywhere, which keeps our workflow simple and avoids misconfigurations.

What is most valuable?

The best feature of Check Point Security Management for me is the Advanced Threat Prevention because it integrates protection against malware, phishing, and network attacks in different blades or gateways, alongside centralized policy management.

One more feature worth highlighting about Check Point Security Management is how advanced threat prevention and centralized policy management work together to simplify our daily operations, as threat prevention tools automatically block malware and phishing attempts across all environments while centralized policies ensure those protections apply consistently everywhere, significantly reducing the gaps between sites or platforms and lessening the team's troubleshooting time.

Check Point Security Management has positively impacted our organization by streamlining different policy management in a single console, and incident response has also become faster because all alerts and logs feed into one security tool or management tool, giving us immediate visibility without needing to switch between tools.

What needs improvement?

Check Point Security Management could be improved with better reporting and dashboard customization options, as having more tailored insights for different stakeholders would enhance visibility, but this is a minor concern.

For how long have I used the solution?

I have been using Check Point Security Management for five years.

What do I think about the stability of the solution?

In my experience, Check Point Security Management is very stable.

What do I think about the scalability of the solution?

Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.

How are customer service and support?

The customer support is very fast, and I love the support.

How would you rate customer service and support?

Positive

What was our ROI?

I have seen a return on investment, mainly in terms of the time saved.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing is great, and I find the pricing to be good for me.

What other advice do I have?

Check Point Security Management should be considered by others as the best centralized management for different gateways, as it is an excellent tool that I recommend to others.

Check Point Security Management is deployed in a hybrid cloud environment in our organization.

We use Azure as our cloud provider.

I did purchase Check Point Security Management through the Azure marketplace.

Incident response has improved significantly; for example, phishing attempts or firewall misconfigurations that used to take a full day to investigate can now be identified and addressed within a couple of hours, freeing up the team around two to five hours per week.

Check Point Security Management is very scalable in our organization, and we have had no problems with it at all.

I give this review a rating of ten out of ten.


    Roy Lopez

Simplified threat detection and reduced policy deployment time

  • November 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Security Management centralizes the management and control over different site gateways, for example, in Azure or on-premise, allowing me to streamline security processes.

When I create different policies or VPNs or view activity or logs, I need to look at one site. In this case, Check Point Security Management provides everything for this scenario, offering me a comprehensive view.

When I need to prevent different threats over the network, I access Check Point Security Management and view the events or logs for different threats or suspicious activities, which enhances my overall security strategy.

What is most valuable?

The standout features of Check Point Security Management are unified policy management, real-time visibility, and automation capabilities, making it a powerful tool for security management.

Consistency across environments with Check Point Security Management helps me ensure that instead of maintaining separate rules for firewalls, cloud workloads, and data centers, we apply one unified policy that covers them all. This reduces misconfigurations and ensures compliance, proving to be a time-saver because rolling out a new rule or updating an existing one takes minutes, not hours, because it is propagated everywhere automatically.

Automation is one of the most valuable aspects of Check Point Security Management, and it often does not get enough attention compared to headline features like unified policies or visibility. With policy automation, routine tasks such as rule creation, compliance checks, or policy updates can be automated, reducing human error and saving hours of manual work.

Check Point Security Management has simplified administration in my organization because instead of juggling multiple consoles, everything is managed from a single pane of glass. This has reduced complexity and saved significant time for our IT team, improving our operational efficiency.

For a policy update, I used to spend two or three hours across multiple consoles. Now, with unified management in Check Point Security Management, it takes thirty to forty minutes, resulting in about a seventy percent reduction in effort, greatly boosting productivity.

What needs improvement?

While Check Point Security Management handles large environments well, performance and scalability could be improved because log queries and reporting generation can sometimes be slower under heavy loads. Optimizing performance for very large data sets would help the enterprise.

The documentation for Check Point Security Management needs to be more intuitive for all users and for first-time implementations, making it easier to navigate and utilize effectively.

For how long have I used the solution?

I have been working in my current field for around five years, gaining extensive experience in technical support roles.

I have been using Check Point Security Management for around four years, which has significantly enhanced my capabilities in managing security efficiently.

What do I think about the stability of the solution?

Check Point Security Management is very stable in my experience, ensuring that our operations run smoothly without interruptions.

What do I think about the scalability of the solution?

Check Point Security Management has very good scalability, effectively meeting our needs as our organization has grown over time.

How are customer service and support?

The customer support for Check Point Security Management is very fast, and for me, it is very good, providing prompt assistance when needed.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Security Management, as it was my first choice for security management.

What was our ROI?

I consider the time saved in the department as a significant return on investment from using Check Point Security Management, which enhances overall productivity.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Security Management is great because the pricing is normal compared with other solutions in the market.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Security Management; it was a clear decision based on its features and capabilities.

What other advice do I have?

Check Point Security Management delivers strong centralized control, unified policies and management, and real-time visibility. It is not a perfect ten because there are areas that could be improved, for example, the documentation.

I recommend Check Point Security Management as an excellent tool for security and for centralizing your gateway, making it a solid choice for organizations looking to enhance their security posture.

I rate Check Point Security Management an eight overall, reflecting my experience with the platform.


    reviewer2751156

Years of using the solution significantly improve log management and troubleshooting efficiency

  • August 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is that we use it to manage all our firewalls and also look at the logs that the firewalls generate.

I use the logs in Check Point Security Management both for troubleshooting, seeing traffic from one IP to another IP, and for threat detection, viewing what the IPS and IDS and anti-bot and antivirus generate. It gives a very nice overview where you can see what has happened, when, and what client has generated the logs. It's very easy to get an overview of what's happening in the network.

How has it helped my organization?

Check Point Security Management has positively impacted my organization because, after migrating from our previous firewall, a Cisco ASA, we were able to see what traffic was passing through the firewall and from that, build out least access privilege firewall rules. So only what's actually needed by the organization is being let through. The rest is being dropped.

The measurable outcomes with Check Point Security Management show that the troubleshooting is definitely quicker. Now it just takes a few minutes to find out where the error is and resolve it. Before, it was at least an hour or two of troubleshooting to locate the issue.

What is most valuable?

The best feature Check Point Security Management offers is definitely the log management. I've worked with other firewall vendors and the overview of the logs that you get in Check Point Security Management is superb. You don't get that anywhere else. It's very easy to troubleshoot what traffic is being dropped, what traffic is being passed. It's easy to build firewall rules and everything else. It's miles ahead of anyone else.

What needs improvement?

Check Point Security Management could definitely improve the lag inside the application. The application has a tendency to get slow when you have a lot of firewall rules inside it. Additionally, it crashes pretty regularly, so they could resolve the stability issues as well.

Regarding the crashes in Check Point Security Management, at least once a day, the application crashes with some random error message. Then you have to close it out and open it up again. The process takes around a minute or two to get back to where you were. It's very frustrating.

For how long have I used the solution?

I have been using Check Point Security Management for about seven years now.

What do I think about the stability of the solution?

Check Point Security Management is stable, but the SmartConsole used to administrate the security management is somewhat unstable. The application crashes at least once a day with some random error message. Then you have to close it out and open it up again. The process takes around a minute or two to get back to where you were.

How are customer service and support?

The customer support for Check Point Security Management is great. We have had no issues with them.

I would rate the customer support for Check Point Security Management an eight on a scale of one to 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before Check Point Security Management, I previously used a Cisco ASA.

I switched from Cisco ASA to Check Point Security Management because the Cisco ASA was standalone and had no central management. We went from that to using Check Point Security Management for centralized management of all of our firewalls.

What was our ROI?

In terms of return on investment, we definitely need fewer employees to manage the amount of firewalls than before. The time to resolve issues is very much better now with Check Point Security Management.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Security Management is that the licensing is straightforward. We pay on a three-year base. It's very fair pricing.

Which other solutions did I evaluate?

Before choosing Check Point Security Management, I did not evaluate other options.

What other advice do I have?

I would definitely give Check Point Security Management a 10 out of 10 because the logging oversight that Check Point Security Management gives is superb compared to anything else I've ever tried.

My advice to others looking into using Check Point Security Management is to definitely talk with Check Point Professional Services on how to deploy it since creating management of remote sites over VPN can be challenging. Having a plan on how to actually do that is great beforehand.

Overall rating: 10/10


    networke1856865

Centralized management of extensive firewall infrastructure reduces errors and saves time

  • August 20, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Security Management is to manage about 500 Check Point firewalls, and we manage all this equipment with this solution.

In my day-to-day work, I manage typical tasks with Check Point Security Management such as policy updates, monitoring, and troubleshooting, and it's easy to manage all the firewalls in this big environment with this solution.

I do not have anything else to add about my main use case or how I use Check Point Security Management.

What is most valuable?

In my opinion, the best feature Check Point Security Management offers is the ability to upgrade firewalls directly from the management console of the security management, which stands out to me.

Being able to upgrade firewalls directly from the management console makes a big difference for me because it reduces errors, and we do a lot of things automatically, which improves the upgrade process.

Check Point Security Management has positively impacted my organization by saving a lot of time because we have a lot of firewalls, and it provides a console where I can see directly all the managed firewalls, allowing us to manage all of our firewalls from just one point.

What needs improvement?

I have used Check Point Security Management for several years and have seen its evolution, and I believe they can improve the management by allowing better API functionality because the API now is a little complicated, making it difficult to do automation.

The improvements I would like to see in the API specifically relate to ease of use because the REST API is not easy to use.

For how long have I used the solution?

I have been using Check Point Security Management for more than 13 years.

What do I think about the stability of the solution?

Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades, but after the upgrade, the platform is very stable.

How are customer service and support?

I have reached out to customer support for Check Point Security Management many times, and they answer quickly, with the level of support depending on the difficulty of the problem.

Which solution did I use previously and why did I switch?

Before using Check Point Security Management, I used a Cisco solution, and we switched to Check Point because Cisco management was not user-friendly, had a lot of bugs, and was very difficult to use.

What was our ROI?

I can't respond to how much time I've saved or how many incidents have been reduced since I started using Check Point Security Management because I'm pretty sure we saved a lot of time due to the central point of this tool, but I can't share examples.

I have not seen a return on investment in terms of time saved, fewer employees needed, or other benefits since I cannot share any relevant metrics.

Which other solutions did I evaluate?

We use Fortinet and Cisco as other tech products.

What other advice do I have?

My advice to others looking into using Check Point Security Management is that if you're looking for an easy tool to manage your firewall, you have to use this tool.

I do not have any additional thoughts about Check Point Security Management before we wrap up.

On a scale of one to ten, I rate Check Point Security Management a ten.


    Edrisa Biliba

The solution provides real visibility and secures the infrastructure effectively

  • January 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was my first implementation. We have another client, and the plan is to do something with them this year, although I'm not sure when. I've been involved in some other things, however, this was my first implementation.

What is most valuable?

It's a reliable solution for security without mentioning its importance. We can't work without Check Point since it provides the real visibility needed to manage the environment. You can depend on it, as it assures the environment is well-secured. It's doing great work, and we can't work without SQL. We don't work with any other solution.

What needs improvement?

One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision the virtual machine twice. Another reason is that the database was already large thanks to the numerous logs. I'm not sure how they can be managed comprehensively.

For how long have I used the solution?

I have done my first implementation of the solution.

What do I think about the stability of the solution?

Ever since I implemented it, we have not had any complaints from the client side. That is a good sign regarding stability.

How are customer service and support?

Check support was involved during the implementation. We had support during the migration process. The issue was the size of the partition for logs. After the support, we realized we needed to resize. The challenge was with drivers due to the size, and we had not provisioned the partition to the right size. This was resolved with support.

How would you rate customer service and support?

Neutral

How was the initial setup?

We had to determine the specifications required for the security of the virtual machine, such as memory, storage, and network setup. The provisioning of the VM depended on the available resources since the box itself had a lot of memory. Specifications are crucial for the setup, and we needed enough storage. The migration was time-consuming but manageable.

Which other solutions did I evaluate?

With Check Point, I can compare it with Fortinet. Fortinet is a bit lower, while Check Point is on a higher level in terms of visibility and reliability. I've seen recommendations for Check Point over other products.

What other advice do I have?

I would definitely recommend Check Point, especially since our client was already using it. We had considered other options, but Check Point was preferable. The implementation supports an environment with more than one hundred users.

Overall, I would rate this product a ten out of ten.


    Kalpesh Panchal

Provides multifactor authentication, IPS protection, and threat emulation

  • July 10, 2024
  • Review from a verified AWS customer

What is our primary use case?

We use the solution for VPN with multifactor authentication, IPS protection, and threat emulation. We have deployed the product in the cloud data center.

What is most valuable?

It's very easy for management to understand workflow and everything.

What needs improvement?

Check Point Tech Support will not assist with new configurations if we encounter any issues during the configuration process. They only provide support if there are issues with existing configurations.

For how long have I used the solution?

I have been using Check Point Security Management for four years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

It is 100% scalable. Behind the firewalls, around 25 web applications are accessed daily. Each application can be accessed by up to one lakh people every day.

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I worked with FortiGate, and integrating that product with cloud platforms was very difficult. The workflows were overly complex, and the documentation was inadequate.

Check Point is superior to other security vendors. Their signature database, which includes antivirus, IPS, and anti-malware, is highly advanced. The system is easy to understand, and deployment via the web interface is also straightforward.

For example, during the COVID-19 pandemic, a new vulnerability known as Log4j emerged. While many vendors were unaware of this vulnerability, Check Point promptly emailed all its customers to inform them. They reassured customers that their gateways already had predefined prevention signatures to protect against this threat, requiring no additional action. 

How was the initial setup?

The initial setup is straightforward. Fresh deployment and creating the gateways will take approximately three to four hours.

With Fortinet, managing the product through cloud formation can be difficult to implement in a cloud environment because it's not straightforward. First, we need to spin up some VMs and configure everything manually. In contrast, Check Point provides a more seamless cloud formation process. With Check Point, you click on the cloud formation option, and the VMs and necessary configurations are automatically set up. You will get GUI access quickly.

Only two resources are required. One knows Check Point, and another guy knows the cloud platform where they want to deploy the gateway.

What other advice do I have?

The integration process is straightforward. If you have some knowledge of your cloud service provider, you can easily integrate with it.

It has improved over the past four years. Previously, pushing any policy from the management server to the security gateway could take around ten to fifteen minutes. However, this task is now completed in about one minute with the new firmware version. This improvement demonstrates the substantial advancements made in the Management of Check Point products. It continuously updates its products to align with security standards and market awareness. They implement these updates in their own unique way. It is a strong player in the security market and has a long-standing presence. Their solutions are reliable and trusted for real security needs.

Maintenance is very easy.

First, we will thoroughly understand their requirements. Once we understand clearly, we will design tailored solutions for them. Next, we will present these solutions to the customer for review and discussion. Following their approval, we will run POC, collect evidence as required, and submit the comprehensive report.

Overall, I rate the solution a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    SanjeevKumar20

Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats

  • June 08, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the product as a perimeter and core firewall for multiple clients at different locations.

We have physical Smart-1 appliances and virtual appliances in our environment. We merged all of the old managers into these managers and managed to centralize the management of firewalls and see the logs altogether.

We are using management API for large configs, and clear rules, blocking malicious IP addresses with SAM rules, and migrating the VLANs with it.

We have deployed Check Point high-end firewall UTMs to medium business-grade devices with different models. We also have a cloud-based Check Point firewall for one of our clients. It's easy to manage either centrally or as separate devices. We use them for network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

How has it helped my organization?

Check Point's management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.

Access to detailed network logs in real time helps us decide and take prompt action to block and fix threats.

Centralized management is great. With this, we manage all of Check Point products from one central management, we can apply rules, and NATS and manage app and URL Policies, threat prevention, and IPS protection rules.

Secondly, centralized log and report management is important. We can distribute logs to our log appliances with centralized management and view logs without logging additional devices.

HA Structure provides good coverage and works fine. With the HA structure, we can manage two data centers as one, and this is helping much.

We can keep old revisions, and with that, we can check or revert to one when needed.

What is most valuable?

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling,
  • DDoS Protection,
  • HÀ and Clustering,
  • Firewall Rules,
  • Proxy support,
  • Revision history
  • Detailed audit log,
  • Smart Event
  • Filter syntax.

These features are easy to configure and offer multiple options to set them up with cloud services and other vendor firewall products.

We can always feel secure if some things go wrong, I'm sure that we can restore to the old one.

We can apply centralized proxy settings to get additional databases when we need them.

We can get a graphical view of the traffic and provide history when we need it.

What needs improvement?

We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.

However, license update and upgrade processes can be made a little easier.

Also, I'd like to see more integration possibilities between Check Point and other vendor security solutions.

The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.

For how long have I used the solution?

I have been using Check Point for more than 10 years for different clients.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Check Point's knowledge base is very vast and provides lots of information if we need some help. The community is very helpful as well.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have multiple clients and use different technologies, so we work on other vendor products also.

How was the initial setup?

We have a professional service team that we work together for setup-related work to Check Point appliances.

What about the implementation team?

We handle the initial setup in-house.

Which other solutions did I evaluate?

We have multiple clients and use different technologies, so we work on other vendor products also like Cisco ASA, FTD, Palo Alto, FortiGate etc.

What other advice do I have?

Overall I am fully satisfied with Check Point


    Charity Kimotho

Provides security and reliability, integrates well with other products, and the exceptions work well

  • February 21, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution mostly for policy pushing to other gateways.

How has it helped my organization?

We deployed the tool for a customer. They faced an attack, but Check Point did not allow it. Check Point does not allow unauthorized access to the network. It just sends a message to the person saying they are not authorized to access the network. The exceptions work very well. Most of the attacks go through the web path. The tool does a good job of securing the web path.

What is most valuable?

We can easily push the policies to any of our gateways. The solution manages the gateways. It works well with other products. It integrates well with Cisco products, too.

What needs improvement?

The tool is expensive.

For how long have I used the solution?

I have been using the solution for the last two years.

What do I think about the stability of the solution?

The tool is very stable. The equipment is never down.

What do I think about the scalability of the solution?

We have more than ten customers.

How are customer service and support?

The support is very good. We get a response immediately whenever we enter a support request on the website. We do not have to wait for one or two hours. The team also offers remote support. The support provided by Check Point is one of the best in the market.

How was the initial setup?

We have most of the products on-premise. We have only one client on a VM. Check Point offers training for their products. They usually send us a link every time they launch a new feature. Unless we go through the tutorials, it will be difficult for us to deploy the solution. However, it is easy to deploy when you know how to do it. It is easy to navigate if we have read about the gadget.

What's my experience with pricing, setup cost, and licensing?

The tool is expensive. However, if we buy Check Point Security Management, we do not have to buy anything else. We get all the features we need in a single solution. We get value for our money.

What other advice do I have?

If we want to troubleshoot, we just have to log in to the SMS. Everything is listed there. We just have to log in to the gateway we have an issue with. We need not go to the server rooms. I see no improvements needed in the product. The other gateways and SD-WAN could be improved. If someone wishes to use the product, they have chosen the best option. It provides security, reliability, and support. Though it is expensive, it is the best. It has all the features we need. The product is absolutely excellent. Overall, I rate the tool a ten out of ten.


    reviewer06814135

Great DDoS protection, high availability, and useful firewall rule implementation

  • October 12, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the product as a primary gateway firewall for all offices at different locations.

We have deployed their high-end firewall UTMs to medium business grade devices 1400 series. They are easy to manage either centrally or as separate devices. We are using them for Network security including firewall rules, NATTing, Web application access, IPSec VPN tunneling between offices and cloud services, user VPN clients for access from home, data encryption, anti-malware/anti-virus solutions, and as network gateway devices for routing and DNS.

How has it helped my organization?

We have seen tremendous improvement in the overall security of the organization's IT assets. We performed Pen Tests and External vulnerability audits on our network and we always scored top-rated thanks to Check Point.

Their management portal and firmware are very stable and don't require frequent maintenance. Their IPSec tunneling is very stable, especially with Azure and AWS networks.

Access to detailed network logs in real time helps us decide and take prompt action to block/fix threats.

What is most valuable?

The most valuable aspects of the solution include:

  • IPSec VPN Tunneling: they are easy to configure and offer multiple options to set them up with Cloud services and other vendor firewall products over certificates, shared keys etc.
  • DDoS Protection: Firewall cleverly handles such attacks without compromising on performance.
  • HA and Clustering: Seamless load management and High Availability between nodes of firewall clusters.
  • Firewall Rules: You have access to set up rules at a very granular level and all are accessible through the GUI platform as well as over CMDLET.

What needs improvement?

We didn't find any major feature missing or lacking in Check Point products that we used. We'd just like them to continue to improve their products with new features and updates.

We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners.

The Check Point SandBlast platform could also be merged with the Check Point GAIA platform for a central management console and easier controls.

For how long have I used the solution?

I've used the solution for more than ten years.

What do I think about the stability of the solution?

The solution is very stable compared to peers.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support is satisfactory, however, it takes some time to escalate your ticket.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use Sophos and Cisco ASA, however, they were either complicated products to manage or lacked features.

How was the initial setup?

The initial setup wasn't difficult after you attended free platform support sessions by Check Point.

What about the implementation team?

We handled the initial setup in-house.

Which other solutions did I evaluate?

We evaluated Sophos, Cisco ASA, SonicWall, and FortiGate.


    LucianoMiguel

A highly accessible and fast tool that provides a very good technical support

  • June 26, 2023
  • Review provided by PeerSpot

What is our primary use case?

I use it for managing ten clusters in our on-premise environment. With this kind of management, it's possible to question its policy and change many configurations in the files. With its management, we got all the logs from the environment. With Check Point Security Management, we get the benefits of deploying the configuration.

How has it helped my organization?

Owing to the availability of many kinds of incidents, I can say that the solution has served to improve my organization.

What is most valuable?

Regarding the tool's valuable features, I would say that Check Point is a very accessible and fast tool, especially when dealing with logs for the first time. It is a perfect solution for me.

What needs improvement?

From the Check Point Security Management solution, it's possible to get the situation of my clusters. I guess it lacks in providing visibility of the many incidents. Hence, the visibility of incidents is an area where I want the solution to improve.

For how long have I used the solution?

I have been using Check Point Security Management since 2005, so I have used it for maybe twenty years. Also, I am using Check Point Security Management E84.20.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

How are customer service and support?

The solution's technical support is very good. Hence, I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup was easy.

What was our ROI?

It took a year to see a return on investment. I did experience a return on investment using the solution.

What's my experience with pricing, setup cost, and licensing?

Price-wise, it is an expensive solution.

What other advice do I have?

I recommend the solution to those planning to use it.

I rate the overall product between nine to ten out of ten.