Reviews from AWS Marketplace
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Advance protection for endpoint computers and users
What do you like best about the product?
Check Point Antivirus is a very good application which is protect our end users and computers and help us to remove maliciour files / codes.
What do you dislike about the product?
It is reduce little computer perfomance rather than it is very good.
What problems is the product solving and how is that benefiting you?
Protecting an organizations digital assets against malware and bad actors. The Rootkit detection features scan and blocks malicious code designed gain administrative access to machine and real-time detection scans and monitors files as they are accessed.
- Leave a Comment |
- Mark review as helpful
CheckPoint Infinity
What do you like best about the product?
Security Service provided by Checkpoint for using multiple Security Solution for both On-Prem and Cloud
Range to Services such as CloudGuard for protecting workload
Cloud Connect offers a range of other services such as NGFW, EMail, API, and More for protection
SandBlast for Mobile/Windows and Mac EndPoint Protection
Centralize Console for all Security solution from Checkpoint with single glass view
Range to Services such as CloudGuard for protecting workload
Cloud Connect offers a range of other services such as NGFW, EMail, API, and More for protection
SandBlast for Mobile/Windows and Mac EndPoint Protection
Centralize Console for all Security solution from Checkpoint with single glass view
What do you dislike about the product?
Licencing model for Infinity is not clear
What problems is the product solving and how is that benefiting you?
We are performing POC (We have got different services from CheckPoint, and we are Checking functionaility)
Recommendations to others considering the product:
Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA).
Consolidated Cyber Security Architecture
What do you like best about the product?
Consolidated Cyber Security Architecture including Mobile/Network/Cloud/Hybrid and even Internet of Things (IoT) providing prevention from threats both known and unknown.
What do you dislike about the product?
While it does work its best to prevent Zero day attacks, someone needs to get affected in order for others in the industry to be safe guarded. Better and lighter resource utilized sandboxing feature should be integrated in the system.
What problems is the product solving and how is that benefiting you?
Unified Security Management where you can create policies across the environment and has been able to prevent multiple attacks so far. Provides an easy view of traffic logs for auditing and comes with a recommended prevention profile which gets updated very frequently. Has really helped allow/prevent traffic based on the company policy.
Protection on files movement in network
What do you like best about the product?
Check Point Antivirus blade protection against each and every files travel in network such as download and upload.
This software blade is keep updating the databases from the check point cloud with latest signatures and provide extreme protection and malware, spyware, virus such as known and unknown
This software blade is keep updating the databases from the check point cloud with latest signatures and provide extreme protection and malware, spyware, virus such as known and unknown
What do you dislike about the product?
without HTTPs inspection it is not scanning the HTTPS traffic.
What problems is the product solving and how is that benefiting you?
Earlier we havent such solution on gateway but after we procured the license we are now protection on each traffic with HTTPS as well.
Recommendations to others considering the product:
Protection on gateway with antivirus is quite good solution please get it.
Moderate built-in antivirus
What do you like best about the product?
I like that enabling the Check Point Antivirus almost doesn't affect the performance of our security gateways, thus provided the additional security almost without the penalty.
It is also really simple to configure, just a tick in the Smart Console, policy installation, and you are ready to go.
It is also really simple to configure, just a tick in the Smart Console, policy installation, and you are ready to go.
What do you dislike about the product?
There are not much configuration options available, just the options on which file types to scan, and whether to scan the archives or not.
What problems is the product solving and how is that benefiting you?
The Check Point HA Clusters are used for protection of our company's DataCenter located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated among the others and serves to scan the files traversing via the network as the email attachments or via HTTP/S. Such files are scanned on the presence of the known viruses and malware with the help of the built-in database. The database is updated as per schedule, for us it's 4 times a day. The software is quite simple, but still efficient - the antivirus scans are the basic security mechanism which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.
Great security solution
What do you like best about the product?
The building blocks of the Check Point Infinity solution work just great with each other, and the architecture may be easily extended. I also personally like that now there is only one application used to manage all the components - the new Smart Console ( if you worked with R77 version of the software, you will love the unified approach of R80).
What do you dislike about the product?
So far we are fully satisfied with the Check Point Infinity solution and can't provides any disadvantages of the solution.
What problems is the product solving and how is that benefiting you?
The "Infinity" is not some standalone security solution, but the way you plan and implement the whole security infrastructure of you company. It contains all the modern components from Check Point. In our company we use the hardware appliances - Next Generation Firewalls with a bunch of blades activated (DLP, IPS, VPN etc.) to protect the DataCenters, which are controlled by the Check Point Security management (with the current version being R80.30). These are the basic building blocks of the Check Point Infinity, and they work jsut great together, and allow for the future extension - we think about adding the Anti-DDOS protection on the edge of our environments. We are fully satisfied with the abilities it provides and the general approach of the Check Point solutions.
Recommendations to others considering the product:
The solution is great, but if you still hesitate, you may request the demo from the Check Point, or just use the Demo mode of the Smart Console to connect to the cloud management and try it for free. I gives good understanding about the solution capabilities.
Unified security architecture for your company
What do you like best about the product?
The Check Point Infinity architecture is the unified approach for building the unified security infrastructure of our company. I like that it covers all the pieces of the modern enterprise organization security needs - offices and data centers, public cloud environments, interconnects between them, as well as the end user devices - laptops, smartphones, tablets etc. We have the full control over what our employees could do with the devices we provide them, to provide the secure and reliable network infrastructure. I also like that all the components are tightly integrated and there is single endpoint to control all the elements - the Smart Console.
What do you dislike about the product?
Even so we had several support cases opened for the components of the Check Point Infinity architecture, as administrator, I'm satisfied with the solution and the abilities it provides, so can't describe any disadvantages at the moment, except for the overall price of the purchasing and maintaining the whole lot of the components.
What problems is the product solving and how is that benefiting you?
The Check Point Infinity is the key component and the core of the security infrastructure of our company. The elements of it are spread among the offices and physical data centers (Next Generation Firewall with IPS, URL Filtering and Application Control), public cloud environments (CloudGuard security gateways), office computers and laptops (Endpoint Security clients) and even BYOD mobile device (Check Point Capsule). It think it covers all the security aspects we need, and all the components work together like a charm. The components were deployed step-by-step, starting from the network level up to the endpoint devices. Now we have just one place to manage the security of the company - the Check Point Smart Console. In addition, we activated the SmartEvent correlation, and it serves as a in-house Security Operation Center for our support team, with alerting the on-call security engineers in case of serious incidents.
Recommendations to others considering the product:
The Check Point Infinity security architecture is the robust and modern security solution for the organization of any size, but make sure you have a dedicated budged to maintain it - it is really not cheap. Also, it is better to have some dedicated certified Check Point specialist in your engineering team, since the solution is complex.
This is the perfect things to protect our envoirment using CheckPoint Infinity
What do you like best about the product?
Its very easy to deploy and manage for security prospective. We can integrate all the CheckPoint tool / product. It has very good for administration also.
What do you dislike about the product?
There is nothing we can say which dislike.
What problems is the product solving and how is that benefiting you?
With this features we have evaluated this feature and now we are going to procured in this cycle. But yes with this we have short out out most of the infection. and we will reach out goal.
Recommendations to others considering the product:
If you want to block some infection or malicious or zero days attack , you have to procured it.
Simple check for files traversing the network
What do you like best about the product?
1. The Anti-Virus software blade is the part of the NextGeneration Threat Prevention license bundle.
2. The Anti-Virus is able to scan the files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
3. The Anti-Virus software blade is configured via the unified Threat Prevention policy in Smart Console (at least for R80.10 version we use).
4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade (especially if you don't scan nested archives).
5. The updates for the blade are downloaded every two hours.
6. As with the other Check Point blades, the events visibility and logging are outstanding.
2. The Anti-Virus is able to scan the files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
3. The Anti-Virus software blade is configured via the unified Threat Prevention policy in Smart Console (at least for R80.10 version we use).
4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade (especially if you don't scan nested archives).
5. The updates for the blade are downloaded every two hours.
6. As with the other Check Point blades, the events visibility and logging are outstanding.
What do you dislike about the product?
For Anti-Virus to scan the HTTPS traffic, the HTTPS Inspection should be enabled and configured, with Check Point trusted certificates propagated across all the user devices.
What problems is the product solving and how is that benefiting you?
We use the Check Point NGFW Clusters/Gateways at the edges of the office network to protect the security boundaries of our organization. The Check Point Anti-Bot software blade if activated among the other security blades. Its purpose is to scan web (both HTTP and HTTPS) and email (SMTP) traffic on the presence of potentially malicious files and check them agains Check Point Threat Wiki. The blade is good to have to prevent the infection of the end user devices (mostly PCs and laptops) of our company employees.
Recommendations to others considering the product:
The antivirus scans are the essential function of the modern firewall solutions, and Check Point provide that at the great level, bit it is still needed to have other solution in you organization to implement additional layers of security besides that.
This blade having realtime protection, its very easy to manage as well.
What do you like best about the product?
The Antivirus uses realtime virus protection and anomaly based protection from ThreatCloud. It is very useful features
What do you dislike about the product?
No such dis-advantages as antivirus features on NGFW.
What problems is the product solving and how is that benefiting you?
Its protected us on perimeter.
Recommendations to others considering the product:
This is very good features on perimeter.
showing 51 - 60